System shutdown command.
+
+########################################
+##
+## Role access for shutdown.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`shutdown_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_role'($*)) dnl
+
+ gen_require(`
+ type shutdown_t;
+ ')
+
+ shutdown_run($2, $1)
+
+ allow $2 shutdown_t:process { ptrace signal_perms };
+ ps_process_pattern($2, shutdown_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run shutdown.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`shutdown_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_domtrans'($*)) dnl
+
+ gen_require(`
+ type shutdown_t, shutdown_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, shutdown_exec_t, shutdown_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute shutdown in the shutdown
+## domain, and allow the specified role
+## the shutdown domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`shutdown_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_run'($*)) dnl
+
+ gen_require(`
+ attribute_role shutdown_roles;
+ ')
+
+ shutdown_domtrans($1)
+ roleattribute $2 shutdown_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to shutdown.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shutdown_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_signal'($*)) dnl
+
+ gen_require(`
+ type shutdown_t;
+ ')
+
+ allow shutdown_t $1:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send SIGCHLD signals to shutdown.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shutdown_sigchld',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_sigchld'($*)) dnl
+
+ gen_require(`
+ type shutdown_t;
+ ')
+
+ allow $1 shutdown_t:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_sigchld'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get attributes of shutdown executable files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shutdown_getattr_exec_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shutdown_getattr_exec_files'($*)) dnl
+
+ gen_require(`
+ type shutdown_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ allow $1 shutdown_exec_t:file getattr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shutdown_getattr_exec_files'($*)) dnl
+ ')
+
+## Ruby on rails deployment for Apache and Nginx servers.
+
+######################################
+##
+## Execute passenger in the passenger domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`passenger_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `passenger_domtrans'($*)) dnl
+
+ gen_require(`
+ type passenger_t, passenger_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, passenger_exec_t, passenger_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `passenger_domtrans'($*)) dnl
+ ')
+
+
+######################################
+##
+## Execute passenger in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`passenger_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `passenger_exec'($*)) dnl
+
+ gen_require(`
+ type passenger_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, passenger_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `passenger_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read passenger lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`passenger_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `passenger_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type passenger_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, passenger_var_lib_t, passenger_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `passenger_read_lib_files'($*)) dnl
+ ')
+
+## Policy for dmesg.
+
+########################################
+##
+## Execute dmesg in the dmesg domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dmesg_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dmesg_domtrans'($*)) dnl
+
+ gen_require(`
+ type dmesg_t, dmesg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, dmesg_exec_t, dmesg_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dmesg_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute dmesg in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`dmesg_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dmesg_exec'($*)) dnl
+
+ gen_require(`
+ type dmesg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, dmesg_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dmesg_exec'($*)) dnl
+ ')
+
+
+# This should be in an ifdef distro_gentoo but that is not allowed in an if file
+
+########################################
+##
+## Execute dmesg in the dmesg_t domain, and allow the calling role
+## the dmesg_t domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`dmesg_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dmesg_run'($*)) dnl
+
+ gen_require(`
+ type dmesg_t;
+ ')
+
+ dmesg_domtrans($1)
+ role $2 types dmesg_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dmesg_run'($*)) dnl
+ ')
+
+## Abstract Machine Test Utility.
+
+########################################
+##
+## Execute a domain transition to run Amtu.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`amtu_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amtu_domtrans'($*)) dnl
+
+ gen_require(`
+ type amtu_t, amtu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, amtu_exec_t, amtu_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amtu_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run
+## Amtu, and allow the specified role
+## the Amtu domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`amtu_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amtu_run'($*)) dnl
+
+ gen_require(`
+ attribute_role amtu_roles;
+ ')
+
+ amtu_domtrans($1)
+ roleattribute $2 amtu_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amtu_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an amtu environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`amtu_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amtu_admin'($*)) dnl
+
+ gen_require(`
+ type amtu_t, amtu_initrc_exec_t;
+ ')
+
+ allow $1 amtu_t:process { ptrace signal_perms };
+ ps_process_pattern($1, amtu_t)
+
+ init_startstop_service($1, $2, amtu_t, amtu_initrc_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amtu_admin'($*)) dnl
+ ')
+
+## Standards Based Linux Instrumentation for Manageability.
+
+########################################
+##
+## Execute gatherd in the gatherd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`sblim_domtrans_gatherd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sblim_domtrans_gatherd'($*)) dnl
+
+ gen_require(`
+ type sblim_gatherd_t, sblim_gatherd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, sblim_gatherd_exec_t, sblim_gatherd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sblim_domtrans_gatherd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read gatherd pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`sblim_read_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sblim_read_pid_files'($*)) dnl
+
+ gen_require(`
+ type sblim_runtime_t;
+ ')
+
+ files_search_pids($1)
+ allow $1 sblim_runtime_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sblim_read_pid_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an sblim environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`sblim_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sblim_admin'($*)) dnl
+
+ gen_require(`
+ attribute sblim_domain;
+ type sblim_initrc_exec_t, sblim_runtime_t;
+ ')
+
+ allow $1 sblim_domain:process { ptrace signal_perms };
+ ps_process_pattern($1, sblim_domain)
+
+ init_startstop_service($1, $2, sblim_domain, sblim_initrc_exec_t)
+
+ files_search_pids($1)
+ admin_pattern($1, sblim_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sblim_admin'($*)) dnl
+ ')
+
+## Digital Certificate Tracking.
+
+########################################
+##
+## Domain transition to certwatch.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`certwatch_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `certwatch_domtrans'($*)) dnl
+
+ gen_require(`
+ type certwatch_exec_t, certwatch_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, certwatch_exec_t, certwatch_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `certwatch_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute certwatch in the certwatch
+## domain, and allow the specified role
+## the certwatch domain.
+## backchannel.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`certwatch_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `certwatch_run'($*)) dnl
+
+ gen_require(`
+ attribute_role certwatch_roles;
+ ')
+
+ certwatch_domtrans($1)
+ roleattribute $2 certwatch_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `certwatch_run'($*)) dnl
+ ')
+
+## Linux hardware error daemon.
+
+########################################
+##
+## Execute a domain transition to run mcelog.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mcelog_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mcelog_domtrans'($*)) dnl
+
+ gen_require(`
+ type mcelog_t, mcelog_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mcelog_exec_t, mcelog_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mcelog_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an mcelog environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`mcelog_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mcelog_admin'($*)) dnl
+
+ gen_require(`
+ type mcelog_t, mcelog_initrc_exec_t, mcelog_log_t;
+ type mcelog_runtime_t, mcelog_etc_t;
+ ')
+
+ allow $1 mcelog_t:process { ptrace signal_perms };
+ ps_process_pattern($1, mcelog_t)
+
+ init_startstop_service($1, $2, mcelog_t, mcelog_initrc_exec_t)
+
+ files_search_etc($1)
+ admin_pattern($1, mcelog_etc_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, mcelog_log_t)
+
+ files_search_pids($1)
+ admin_pattern($1, mcelog_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mcelog_admin'($*)) dnl
+ ')
+
+## Advanced Linux Sound Architecture utilities.
+
+########################################
+##
+## Execute a domain transition to run Alsa.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`alsa_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_domtrans'($*)) dnl
+
+ gen_require(`
+ type alsa_t, alsa_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, alsa_exec_t, alsa_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run
+## Alsa, and allow the specified role
+## the Alsa domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`alsa_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_run'($*)) dnl
+
+ gen_require(`
+ attribute_role alsa_roles;
+ ')
+
+ alsa_domtrans($1)
+ roleattribute $2 alsa_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write Alsa semaphores.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_rw_semaphores',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_rw_semaphores'($*)) dnl
+
+ gen_require(`
+ type alsa_t;
+ ')
+
+ allow $1 alsa_t:sem rw_sem_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_rw_semaphores'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write Alsa shared memory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_rw_shared_mem',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_rw_shared_mem'($*)) dnl
+
+ gen_require(`
+ type alsa_t;
+ ')
+
+ allow $1 alsa_t:shm rw_shm_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_rw_shared_mem'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read Alsa configuration content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_read_config'($*)) dnl
+
+ gen_require(`
+ type alsa_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 alsa_etc_t:dir list_dir_perms;
+ read_files_pattern($1, alsa_etc_t, alsa_etc_t)
+ read_lnk_files_pattern($1, alsa_etc_t, alsa_etc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_read_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage Alsa config files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_manage_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_manage_config'($*)) dnl
+
+ gen_require(`
+ type alsa_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 alsa_etc_t:dir list_dir_perms;
+ manage_files_pattern($1, alsa_etc_t, alsa_etc_t)
+ read_lnk_files_pattern($1, alsa_etc_t, alsa_etc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_manage_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## alsa home files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_manage_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_manage_home_files'($*)) dnl
+
+ gen_require(`
+ type alsa_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 alsa_home_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_manage_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read Alsa home files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_read_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_read_home_files'($*)) dnl
+
+ gen_require(`
+ type alsa_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 alsa_home_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_read_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel alsa home files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_relabel_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_relabel_home_files'($*)) dnl
+
+ gen_require(`
+ type alsa_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 alsa_home_t:file relabel_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_relabel_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the generic alsa
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`alsa_home_filetrans_alsa_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_home_filetrans_alsa_home'($*)) dnl
+
+ gen_require(`
+ type alsa_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, alsa_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_home_filetrans_alsa_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read Alsa lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_read_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_read_lib'($*)) dnl
+
+ gen_require(`
+ type alsa_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
+
+ ifdef(`distro_gentoo',`
+ # gentoo saves the files in /var/lib/alsa/oss/CardName
+ list_dirs_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_read_lib'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Write Alsa lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`alsa_write_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_write_lib'($*)) dnl
+
+ gen_require(`
+ type alsa_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ write_files_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
+
+ ifdef(`distro_gentoo',`
+ # gentoo saves the files in /var/lib/alsa/oss/CardName
+ rw_dirs_pattern($1, alsa_var_lib_t, alsa_var_lib_t)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_write_lib'($*)) dnl
+ ')
+
+
+# Gentoo specific for now, but cannot use ifdef distro_gentoo in an interface
+
+# alsa_domain - see http://oss.tresys.com/pipermail/refpolicy/2014-March/007029.html
+# http://oss.tresys.com/pipermail/refpolicy/2014-April/007044.html
+
+########################################
+##
+## Mark the selected domain as an alsa-capable domain
+##
+##
+##
+## Domain that links with alsa
+##
+##
+##
+##
+## Tmpfs type used for shared memory of the given domain
+##
+##
+#
+ define(`alsa_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `alsa_domain'($*)) dnl
+
+ gen_require(`
+ attribute alsadomain;
+ attribute alsatmpfsfile;
+ ')
+
+ typeattribute $1 alsadomain;
+ typeattribute $2 alsatmpfsfile;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `alsa_domain'($*)) dnl
+ ')
+
+
+
+## Generate debugging information for system.
+
+########################################
+##
+## Execute a domain transition to run sosreport.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`sosreport_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_domtrans'($*)) dnl
+
+ gen_require(`
+ type sosreport_t, sosreport_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, sosreport_exec_t, sosreport_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute sosreport in the sosreport
+## domain, and allow the specified
+## role the sosreport domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`sosreport_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_run'($*)) dnl
+
+ gen_require(`
+ attribute_role sosreport_roles;
+ ')
+
+ sosreport_domtrans($1)
+ roleattribute $2 sosreport_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Role access for sosreport.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`sosreport_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_role'($*)) dnl
+
+ gen_require(`
+ type sosreport_t;
+ ')
+
+ sosreport_run($2, $1)
+
+ allow $2 sosreport_t:process { ptrace signal_perms };
+ ps_process_pattern($2, sosreport_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read sosreport temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`sosreport_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type sosreport_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ read_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_read_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Append sosreport temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`sosreport_append_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_append_tmp_files'($*)) dnl
+
+ gen_require(`
+ type sosreport_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ append_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_append_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete sosreport temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`sosreport_delete_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sosreport_delete_tmp_files'($*)) dnl
+
+ gen_require(`
+ type sosreport_tmp_t;
+ ')
+
+ files_delete_tmp_dir_entry($1)
+ delete_files_pattern($1, sosreport_tmp_t, sosreport_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sosreport_delete_tmp_files'($*)) dnl
+ ')
+
+## Red Hat utility to change fstab.
+
+########################################
+##
+## Execute updfstab in the updfstab domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`updfstab_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `updfstab_domtrans'($*)) dnl
+
+ gen_require(`
+ type updfstab_t, updfstab_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, updfstab_exec_t, updfstab_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `updfstab_domtrans'($*)) dnl
+ ')
+
+## Utilities for the tboot TXT module.
+
+########################################
+##
+## Execute txt-stat in the txtstat domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tboot_domtrans_txtstat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tboot_domtrans_txtstat'($*)) dnl
+
+ gen_require(`
+ type txtstat_t, txtstat_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, txtstat_exec_t, txtstat_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tboot_domtrans_txtstat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute txt-stat in the txtstat domain, and
+## allow the specified role the txtstat domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## The role to be allowed the txtstat domain.
+##
+##
+#
+ define(`tboot_run_txtstat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tboot_run_txtstat'($*)) dnl
+
+ gen_require(`
+ attribute_role txtstat_roles;
+ ')
+
+ tboot_domtrans_txtstat($1)
+ roleattribute $2 txtstat_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tboot_run_txtstat'($*)) dnl
+ ')
+
+## Read files into page cache for improved performance.
+
+########################################
+##
+## Execute a domain transition
+## to run readahead.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`readahead_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `readahead_domtrans'($*)) dnl
+
+ gen_require(`
+ type readahead_t, readahead_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, readahead_exec_t, readahead_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `readahead_domtrans'($*)) dnl
+ ')
+
+## Network analysis utilities
+
+########################################
+##
+## Execute network utilities in the netutils domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`netutils_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_domtrans'($*)) dnl
+
+ gen_require(`
+ type netutils_t, netutils_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, netutils_exec_t, netutils_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute network utilities in the netutils domain, and
+## allow the specified role the netutils domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`netutils_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_run'($*)) dnl
+
+ gen_require(`
+ type netutils_t;
+ ')
+
+ netutils_domtrans($1)
+ role $2 types netutils_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute network utilities in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_exec'($*)) dnl
+
+ gen_require(`
+ type netutils_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, netutils_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to network utilities.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_signal'($*)) dnl
+
+ gen_require(`
+ type netutils_t;
+ ')
+
+ allow $1 netutils_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ping in the ping domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`netutils_domtrans_ping',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_domtrans_ping'($*)) dnl
+
+ gen_require(`
+ type ping_t, ping_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, ping_exec_t, ping_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_domtrans_ping'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a kill (SIGKILL) signal to ping.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_kill_ping',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_kill_ping'($*)) dnl
+
+ gen_require(`
+ type ping_t;
+ ')
+
+ allow $1 ping_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_kill_ping'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to ping.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_signal_ping',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_signal_ping'($*)) dnl
+
+ gen_require(`
+ type ping_t;
+ ')
+
+ allow $1 ping_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_signal_ping'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ping in the ping domain, and
+## allow the specified role the ping domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`netutils_run_ping',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_run_ping'($*)) dnl
+
+ gen_require(`
+ type ping_t;
+ ')
+
+ netutils_domtrans_ping($1)
+ role $2 types ping_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_run_ping'($*)) dnl
+ ')
+
+
+########################################
+##
+## Conditionally execute ping in the ping domain, and
+## allow the specified role the ping domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`netutils_run_ping_cond',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_run_ping_cond'($*)) dnl
+
+ gen_require(`
+ type ping_t;
+ bool user_ping;
+ ')
+
+ role $2 types ping_t;
+
+ if ( user_ping ) {
+ netutils_domtrans_ping($1)
+ }
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_run_ping_cond'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ping in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_exec_ping',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_exec_ping'($*)) dnl
+
+ gen_require(`
+ type ping_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, ping_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_exec_ping'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute traceroute in the traceroute domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`netutils_domtrans_traceroute',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_domtrans_traceroute'($*)) dnl
+
+ gen_require(`
+ type traceroute_t, traceroute_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, traceroute_exec_t, traceroute_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_domtrans_traceroute'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute traceroute in the traceroute domain, and
+## allow the specified role the traceroute domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`netutils_run_traceroute',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_run_traceroute'($*)) dnl
+
+ gen_require(`
+ type traceroute_t;
+ ')
+
+ netutils_domtrans_traceroute($1)
+ role $2 types traceroute_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_run_traceroute'($*)) dnl
+ ')
+
+
+########################################
+##
+## Conditionally execute traceroute in the traceroute domain, and
+## allow the specified role the traceroute domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`netutils_run_traceroute_cond',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_run_traceroute_cond'($*)) dnl
+
+ gen_require(`
+ type traceroute_t;
+ bool user_ping;
+ ')
+
+ role $2 types traceroute_t;
+
+ if( user_ping ) {
+ netutils_domtrans_traceroute($1)
+ }
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_run_traceroute_cond'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute traceroute in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`netutils_exec_traceroute',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `netutils_exec_traceroute'($*)) dnl
+
+ gen_require(`
+ type traceroute_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, traceroute_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `netutils_exec_traceroute'($*)) dnl
+ ')
+
+##
+## Determine of the console connected to the controlling terminal.
+##
+
+########################################
+##
+## Execute consoletype in the consoletype domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`consoletype_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `consoletype_domtrans'($*)) dnl
+
+ gen_require(`
+ type consoletype_t, consoletype_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, consoletype_exec_t, consoletype_t)
+
+ ifdef(`hide_broken_symptoms', `
+ dontaudit consoletype_t $1:socket_class_set { read write };
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `consoletype_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute consoletype in the consoletype domain, and
+## allow the specified role the consoletype domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`consoletype_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `consoletype_run'($*)) dnl
+
+ gen_require(`
+ type consoletype_t;
+ ')
+
+ consoletype_domtrans($1)
+ role $2 types consoletype_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `consoletype_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute consoletype in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`consoletype_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `consoletype_exec'($*)) dnl
+
+ gen_require(`
+ type consoletype_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, consoletype_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `consoletype_exec'($*)) dnl
+ ')
+
+## Sectool security audit tool.
+
+########################################
+##
+## Role access for sectoolm.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`sectoolm_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sectoolm_role'($*)) dnl
+
+ gen_require(`
+ type sectoolm_t;
+ ')
+
+ allow sectoolm_t $2:unix_dgram_socket sendto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sectoolm_role'($*)) dnl
+ ')
+
+## Check file integrity.
+
+#######################################
+##
+## The template to define a samhain domain.
+##
+##
+##
+## Domain prefix to be used.
+##
+##
+#
+ define(`samhain_service_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_service_template'($*)) dnl
+
+ gen_require(`
+ attribute samhain_domain;
+ type samhain_exec_t;
+ ')
+
+ type $1_t, samhain_domain;
+ domain_type($1_t)
+ domain_entry_file($1_t, samhain_exec_t)
+
+ files_read_all_files($1_t)
+
+ mls_file_write_all_levels($1_t)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_service_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute samhain in the samhain domain
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`samhain_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_domtrans'($*)) dnl
+
+ gen_require(`
+ type samhain_t, samhain_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, samhain_exec_t, samhain_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute samhain in the samhain
+## domain with the clearance security
+## level and allow the specifiled role
+## the samhain domain.
+##
+##
+##
+## Execute samhain in the samhain
+## domain with the clearance security
+## level and allow the specifiled role
+## the samhain domain.
+##
+##
+## The range_transition rule used in
+## this interface requires that the
+## calling domain should have the
+## clearance security level otherwise
+## the MLS constraint for process
+## transition would fail.
+##
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed to access.
+##
+##
+##
+#
+ define(`samhain_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_run'($*)) dnl
+
+ gen_require(`
+ attribute_role samhain_roles;
+ type samhain_exec_t;
+ ')
+
+ samhain_domtrans($1)
+ roleattribute $2 samhain_roles;
+
+ ifdef(`enable_mls', `
+ range_transition $1 samhain_exec_t:process mls_systemhigh;
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## samhain configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`samhain_manage_config_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_manage_config_files'($*)) dnl
+
+ gen_require(`
+ type samhain_etc_t;
+ ')
+
+ files_rw_etc_dirs($1)
+ allow $1 samhain_etc_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_manage_config_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## samhain database files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`samhain_manage_db_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_manage_db_files'($*)) dnl
+
+ gen_require(`
+ type samhain_db_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, samhain_db_t, samhain_db_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_manage_db_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Create, read, write, and delete
+## samhain init script files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`samhain_manage_init_script_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_manage_init_script_files'($*)) dnl
+
+ gen_require(`
+ type samhain_initrc_exec_t;
+ ')
+
+ files_search_etc($1)
+ manage_files_pattern($1, samhain_initrc_exec_t, samhain_initrc_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_manage_init_script_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## samhain log and log.lock files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`samhain_manage_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_manage_log_files'($*)) dnl
+
+ gen_require(`
+ type samhain_log_t;
+ ')
+
+ logging_search_logs($1)
+ manage_files_pattern($1, samhain_log_t, samhain_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_manage_log_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## samhain pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`samhain_manage_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_manage_pid_files'($*)) dnl
+
+ gen_require(`
+ type samhain_runtime_t;
+ ')
+
+ files_search_pids($1)
+ manage_files_pattern($1, samhain_runtime_t, samhain_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_manage_pid_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## All of the rules required to
+## administrate the samhain environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`samhain_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `samhain_admin'($*)) dnl
+
+ gen_require(`
+ attribute samhain_domain;
+ type samhain_db_t, samhain_etc_t;
+ type samhain_initrc_exec_t, samhain_log_t, samhain_runtime_t;
+ ')
+
+ allow $1 samhain_domain:process { ptrace signal_perms };
+ ps_process_pattern($1, samhain_domain)
+
+ # duplicate role transition: remove samhain_admin(sysadm_t, sysadm_r) first
+ # init_startstop_service($1, $2, samhain_domain, samhain_initrc_exec_t)
+
+ files_list_var_lib($1)
+ admin_pattern($1, samhain_db_t)
+
+ files_list_etc($1)
+ admin_pattern($1, { samhain_initrc_exec_t samhain_etc_t })
+
+ logging_list_logs($1)
+ admin_pattern($1, samhain_log_t)
+
+ files_list_pids($1)
+ admin_pattern($1, samhain_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `samhain_admin'($*)) dnl
+ ')
+
+## Configuration management system.
+
+########################################
+##
+## Execute puppetca in the puppetca
+## domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`puppet_domtrans_puppetca',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_domtrans_puppetca'($*)) dnl
+
+ gen_require(`
+ type puppetca_t, puppetca_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, puppetca_exec_t, puppetca_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_domtrans_puppetca'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Execute puppetca in the puppetca
+## domain and allow the specified
+## role the puppetca domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`puppet_run_puppetca',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_run_puppetca'($*)) dnl
+
+ gen_require(`
+ attribute_role puppetca_roles;
+ ')
+
+ puppet_domtrans_puppetca($1)
+ roleattribute $2 puppetca_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_run_puppetca'($*)) dnl
+ ')
+
+
+####################################
+##
+## Read puppet configuration content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_read_config'($*)) dnl
+
+ gen_require(`
+ type puppet_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 puppet_etc_t:dir list_dir_perms;
+ allow $1 puppet_etc_t:file read_file_perms;
+ allow $1 puppet_etc_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_read_config'($*)) dnl
+ ')
+
+
+################################################
+##
+## Read Puppet lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type puppet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_read_lib_files'($*)) dnl
+ ')
+
+
+###############################################
+##
+## Create, read, write, and delete
+## puppet lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_manage_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_manage_lib_files'($*)) dnl
+
+ gen_require(`
+ type puppet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, puppet_var_lib_t, puppet_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_manage_lib_files'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Append puppet log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_append_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_append_log_files'($*)) dnl
+
+ gen_require(`
+ type puppet_log_t;
+ ')
+
+ logging_search_logs($1)
+ append_files_pattern($1, puppet_log_t, puppet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_append_log_files'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Create puppet log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_create_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_create_log_files'($*)) dnl
+
+ gen_require(`
+ type puppet_log_t;
+ ')
+
+ logging_search_logs($1)
+ create_files_pattern($1, puppet_log_t, puppet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_create_log_files'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Read puppet log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_read_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_read_log_files'($*)) dnl
+
+ gen_require(`
+ type puppet_log_t;
+ ')
+
+ logging_search_logs($1)
+ read_files_pattern($1, puppet_log_t, puppet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_read_log_files'($*)) dnl
+ ')
+
+
+################################################
+##
+## Read and write to puppet tempoprary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`puppet_rw_tmp',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_rw_tmp'($*)) dnl
+
+ gen_require(`
+ type puppet_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ allow $1 puppet_tmp_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_rw_tmp'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an puppet environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`puppet_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `puppet_admin'($*)) dnl
+
+ gen_require(`
+ type puppet_initrc_exec_t, puppetmaster_initrc_exec_t, puppet_log_t;
+ type puppet_var_lib_t, puppet_tmp_t, puppet_etc_t;
+ type puppet_runtime_t, puppetmaster_tmp_t;
+ type puppet_t, puppetca_t, puppetmaster_t;
+ ')
+
+ allow $1 { puppet_t puppetca_t puppetmaster_t }:process { ptrace signal_perms };
+ ps_process_pattern($1, { puppet_t puppetca_t puppetmaster_t })
+
+ init_startstop_service($1, $2, puppet_t, puppet_initrc_exec_t)
+ init_startstop_service($1, $2, puppetmaster_t, puppetmaster_initrc_exec_t)
+
+ files_search_etc($1)
+ admin_pattern($1, puppet_etc_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, puppet_log_t)
+
+ files_search_var_lib($1)
+ admin_pattern($1, puppet_var_lib_t)
+
+ files_search_pids($1)
+ admin_pattern($1, puppet_runtime_t)
+
+ files_search_tmp($1)
+ admin_pattern($1, { puppet_tmp_t puppetmaster_tmp_t })
+
+ puppet_run_puppetca($1, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `puppet_admin'($*)) dnl
+ ')
+
+## Policy for managing user accounts.
+
+########################################
+##
+## Execute chfn in the chfn domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usermanage_domtrans_chfn',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_chfn'($*)) dnl
+
+ gen_require(`
+ type chfn_t, chfn_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, chfn_exec_t, chfn_t)
+
+ ifdef(`hide_broken_symptoms',`
+ dontaudit chfn_t $1:socket_class_set { read write };
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_domtrans_chfn'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute chfn in the chfn domain, and
+## allow the specified role the chfn domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`usermanage_run_chfn',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_run_chfn'($*)) dnl
+
+ gen_require(`
+ attribute_role chfn_roles;
+ ')
+
+ usermanage_domtrans_chfn($1)
+ roleattribute $2 chfn_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_run_chfn'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute groupadd in the groupadd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usermanage_domtrans_groupadd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_groupadd'($*)) dnl
+
+ gen_require(`
+ type groupadd_t, groupadd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, groupadd_exec_t, groupadd_t)
+
+ ifdef(`hide_broken_symptoms',`
+ dontaudit groupadd_t $1:socket_class_set { read write };
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_domtrans_groupadd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute groupadd in the groupadd domain, and
+## allow the specified role the groupadd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`usermanage_run_groupadd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_run_groupadd'($*)) dnl
+
+ gen_require(`
+ attribute_role groupadd_roles;
+ ')
+
+ usermanage_domtrans_groupadd($1)
+ roleattribute $2 groupadd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_run_groupadd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute passwd in the passwd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usermanage_domtrans_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_passwd'($*)) dnl
+
+ gen_require(`
+ type passwd_t, passwd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, passwd_exec_t, passwd_t)
+
+ ifdef(`hide_broken_symptoms',`
+ dontaudit passwd_t $1:socket_class_set { read write };
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_domtrans_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send sigkills to passwd.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`usermanage_kill_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_kill_passwd'($*)) dnl
+
+ gen_require(`
+ type passwd_t;
+ ')
+
+ allow $1 passwd_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_kill_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Check if the passwd binary is executable.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`usermanage_check_exec_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_check_exec_passwd'($*)) dnl
+
+ gen_require(`
+ type passwd_exec_t;
+ ')
+
+ allow $1 passwd_exec_t:file { execute getattr_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_check_exec_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute passwd in the passwd domain, and
+## allow the specified role the passwd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`usermanage_run_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_run_passwd'($*)) dnl
+
+ gen_require(`
+ attribute_role passwd_roles;
+ ')
+
+ usermanage_domtrans_passwd($1)
+ roleattribute $2 passwd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_run_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute password admin functions in
+## the admin passwd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usermanage_domtrans_admin_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_admin_passwd'($*)) dnl
+
+ gen_require(`
+ type sysadm_passwd_t, admin_passwd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, admin_passwd_exec_t, sysadm_passwd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_domtrans_admin_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute passwd admin functions in the admin
+## passwd domain, and allow the specified role
+## the admin passwd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`usermanage_run_admin_passwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_run_admin_passwd'($*)) dnl
+
+ gen_require(`
+ attribute_role sysadm_passwd_roles;
+ ')
+
+ usermanage_domtrans_admin_passwd($1)
+ roleattribute $2 sysadm_passwd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_run_admin_passwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to use useradd fds.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`usermanage_dontaudit_use_useradd_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_dontaudit_use_useradd_fds'($*)) dnl
+
+ gen_require(`
+ type useradd_t;
+ ')
+
+ dontaudit $1 useradd_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_dontaudit_use_useradd_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute useradd in the useradd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usermanage_domtrans_useradd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_domtrans_useradd'($*)) dnl
+
+ gen_require(`
+ type useradd_t, useradd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, useradd_exec_t, useradd_t)
+
+ ifdef(`hide_broken_symptoms',`
+ dontaudit useradd_t $1:socket_class_set { read write };
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_domtrans_useradd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Check if the useradd binaries are executable.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`usermanage_check_exec_useradd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_check_exec_useradd'($*)) dnl
+
+ gen_require(`
+ type useradd_exec_t;
+ ')
+
+ allow $1 useradd_exec_t:file { execute getattr_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_check_exec_useradd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute useradd in the useradd domain, and
+## allow the specified role the useradd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`usermanage_run_useradd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_run_useradd'($*)) dnl
+
+ gen_require(`
+ attribute_role useradd_roles;
+ ')
+
+ usermanage_domtrans_useradd($1)
+ roleattribute $2 useradd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_run_useradd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the crack database.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`usermanage_read_crack_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usermanage_read_crack_db'($*)) dnl
+
+ gen_require(`
+ type crack_db_t;
+ ')
+
+ files_search_var($1)
+ read_files_pattern($1, crack_db_t, crack_db_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usermanage_read_crack_db'($*)) dnl
+ ')
+
+## Execute a command with a substitute user
+
+#######################################
+##
+## The role template for the sudo module.
+##
+##
+##
+## This template creates a derived domain which is allowed
+## to change the linux user id, to run commands as a different
+## user.
+##
+##
+##
+##
+## The prefix of the user role (e.g., user
+## is the prefix for user_r).
+##
+##
+##
+##
+## The user role.
+##
+##
+##
+##
+## The user domain associated with the role.
+##
+##
+#
+ define(`sudo_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sudo_role_template'($*)) dnl
+
+
+ gen_require(`
+ type sudo_exec_t;
+ attribute sudodomain;
+ ')
+
+ ##############################
+ #
+ # Declarations
+ #
+
+ type $1_sudo_t, sudodomain;
+ userdom_user_application_domain($1_sudo_t, sudo_exec_t)
+ domain_interactive_fd($1_sudo_t)
+ domain_role_change_exemption($1_sudo_t)
+ role $2 types $1_sudo_t;
+
+ ##############################
+ #
+ # Local Policy
+ #
+
+ # Use capabilities.
+ allow $1_sudo_t self:capability { chown dac_override fowner kill setgid setuid sys_nice sys_resource };
+ allow $1_sudo_t self:process { signal_perms getsched setsched getsession getpgid setpgid getcap setcap share getattr getrlimit rlimitinh siginh transition setsockcreate dyntransition noatsecure setkeycreate };
+ allow $1_sudo_t self:process { setexec setrlimit };
+ allow $1_sudo_t self:fd use;
+ allow $1_sudo_t self:fifo_file rw_fifo_file_perms;
+ allow $1_sudo_t self:shm create_shm_perms;
+ allow $1_sudo_t self:sem create_sem_perms;
+ allow $1_sudo_t self:msgq create_msgq_perms;
+ allow $1_sudo_t self:msg { send receive };
+ allow $1_sudo_t self:unix_dgram_socket create_socket_perms;
+ allow $1_sudo_t self:unix_stream_socket create_stream_socket_perms;
+ allow $1_sudo_t self:unix_dgram_socket sendto;
+ allow $1_sudo_t self:unix_stream_socket connectto;
+ allow $1_sudo_t self:key manage_key_perms;
+
+ allow $1_sudo_t $3:key search;
+
+ # Transmit SIGWINCH to children
+ allow $1_sudo_t $3:process signal;
+
+ # Enter this derived domain from the user domain
+ domtrans_pattern($3, sudo_exec_t, $1_sudo_t)
+
+ # By default, revert to the calling domain when a shell is executed.
+ corecmd_shell_domtrans($1_sudo_t, $3)
+ corecmd_bin_domtrans($1_sudo_t, $3)
+ allow $3 $1_sudo_t:fd use;
+ allow $3 $1_sudo_t:fifo_file rw_fifo_file_perms;
+ allow $3 $1_sudo_t:process signal_perms;
+
+ kernel_read_kernel_sysctls($1_sudo_t)
+ kernel_read_system_state($1_sudo_t)
+ kernel_link_key($1_sudo_t)
+
+ corecmd_exec_all_executables($1_sudo_t)
+
+ dev_getattr_fs($1_sudo_t)
+ dev_read_urand($1_sudo_t)
+ dev_rw_generic_usb_dev($1_sudo_t)
+ dev_read_sysfs($1_sudo_t)
+
+ domain_use_interactive_fds($1_sudo_t)
+ domain_sigchld_interactive_fds($1_sudo_t)
+ domain_getattr_all_entry_files($1_sudo_t)
+
+ files_read_etc_files($1_sudo_t)
+ files_read_var_files($1_sudo_t)
+ files_read_usr_symlinks($1_sudo_t)
+ files_getattr_usr_files($1_sudo_t)
+ # for some PAM modules and for cwd
+ files_dontaudit_search_home($1_sudo_t)
+ files_list_tmp($1_sudo_t)
+
+ fs_search_auto_mountpoints($1_sudo_t)
+ fs_getattr_xattr_fs($1_sudo_t)
+
+ selinux_validate_context($1_sudo_t)
+ selinux_compute_relabel_context($1_sudo_t)
+
+ term_getattr_pty_fs($1_sudo_t)
+ term_dontaudit_getattr_unallocated_ttys($1_sudo_t)
+ term_relabel_all_ttys($1_sudo_t)
+ term_relabel_all_ptys($1_sudo_t)
+
+ auth_run_chk_passwd($1_sudo_t, $2)
+ # sudo stores a token in the pam_pid directory
+ auth_manage_pam_pid($1_sudo_t)
+ auth_use_pam($1_sudo_t)
+ auth_pid_filetrans_pam_var_run($1_sudo_t, dir, "sudo")
+
+ init_rw_utmp($1_sudo_t)
+
+ logging_send_audit_msgs($1_sudo_t)
+ logging_send_syslog_msg($1_sudo_t)
+
+ miscfiles_read_localization($1_sudo_t)
+
+ seutil_read_default_contexts($1_sudo_t)
+ seutil_libselinux_linked($1_sudo_t)
+
+ userdom_spec_domtrans_all_users($1_sudo_t)
+ userdom_create_all_users_keys($1_sudo_t)
+ userdom_create_user_pty($1_sudo_t)
+ userdom_manage_user_home_content_files($1_sudo_t)
+ userdom_manage_user_home_content_symlinks($1_sudo_t)
+ userdom_manage_user_tmp_files($1_sudo_t)
+ userdom_manage_user_tmp_symlinks($1_sudo_t)
+ userdom_setattr_user_ptys($1_sudo_t)
+ userdom_use_user_terminals($1_sudo_t)
+ # for some PAM modules and for cwd
+ userdom_dontaudit_search_user_home_content($1_sudo_t)
+ userdom_dontaudit_search_user_home_dirs($1_sudo_t)
+
+ ifdef(`hide_broken_symptoms', `
+ dontaudit $1_sudo_t $3:socket_class_set { read write };
+ ')
+
+ tunable_policy(`use_nfs_home_dirs',`
+ fs_manage_nfs_files($1_sudo_t)
+ ')
+
+ tunable_policy(`use_samba_home_dirs',`
+ fs_manage_cifs_files($1_sudo_t)
+ ')
+
+ optional_policy(`
+ dbus_system_bus_client($1_sudo_t)
+
+ ifdef(`init_systemd',`
+ init_dbus_chat($1_sudo_t)
+ ')
+ ')
+
+ optional_policy(`
+ fprintd_dbus_chat($1_sudo_t)
+ ')
+
+ ifdef(`distro_gentoo',`
+ # Fix bug 549640 - Add dontaudit getattr on chr and blk devices as is done with regular user domains too
+ dev_dontaudit_getattr_all_blk_files($1_sudo_t)
+ dev_dontaudit_getattr_all_chr_files($1_sudo_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sudo_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a SIGCHLD signal to the sudo domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`sudo_sigchld',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sudo_sigchld'($*)) dnl
+
+ gen_require(`
+ attribute sudodomain;
+ ')
+
+ allow $1 sudodomain:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sudo_sigchld'($*)) dnl
+ ')
+
+## fake-hwclock - Control fake hardware clock.
+
+########################################
+##
+## Execute a domain transition to run fake-hwclock.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`fakehwclock_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `fakehwclock_domtrans'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ gen_require(`
+ type fakehwclock_t, fakehwclock_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, fakehwclock_exec_t, fakehwclock_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `fakehwclock_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute fake-hwclock in the fake-hwclock domain,
+## and allow the specified role
+## the fake-hwclock domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`fakehwclock_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `fakehwclock_run'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ gen_require(`
+ attribute_role fakehwclock_roles;
+ ')
+
+ fakehwclock_domtrans($1)
+ roleattribute $2 fakehwclock_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `fakehwclock_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## All the rules required to
+## administrate an fake-hwclock environment.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`fakehwclock_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `fakehwclock_admin'($*)) dnl
+
+ gen_require(`
+ type fakehwclock_t, fakehwclock_backup_t, fakehwclock_initrc_exec_t;
+ type fakehwclock_unit_t;
+ ')
+
+ admin_process_pattern($1, fakehwclock_t)
+
+ init_startstop_service($1, $2, fakehwclock_t, fakehwclock_initrc_exec_t, fakehwclock_unit_t)
+
+ files_search_etc($1)
+ admin_pattern($1, fakehwclock_backup_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `fakehwclock_admin'($*)) dnl
+ ')
+
+## Manage temporary directory sizes and file ages.
+
+########################################
+##
+## Execute tmpreaper in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`tmpreaper_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tmpreaper_exec'($*)) dnl
+
+ gen_require(`
+ type tmpreaper_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, tmpreaper_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tmpreaper_exec'($*)) dnl
+ ')
+
+## Anaconda installer.
+## IEEE 802.11 wireless LAN sniffer.
+
+########################################
+##
+## Role access for kismet.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`kismet_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_role'($*)) dnl
+
+ gen_require(`
+ type kismet_home_t, kismet_tmp_t, kismet_tmpfs_t;
+ type kismet_t;
+ ')
+
+ kismet_run($1, $2)
+
+ allow $2 kismet_t:process { ptrace signal_perms };
+ ps_process_pattern($2, kismet_t)
+
+ allow $2 kismet_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 kismet_home_t:file { manage_file_perms relabel_file_perms };
+ userdom_user_home_dir_filetrans($2, kismet_home_t, dir, ".kismet")
+
+ allow $2 kismet_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 kismet_tmp_t:file { manage_file_perms relabel_file_perms };
+ allow $2 kismet_tmp_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow $2 kismet_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 kismet_tmpfs_t:file { manage_file_perms relabel_file_perms };
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run kismet.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`kismet_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_domtrans'($*)) dnl
+
+ gen_require(`
+ type kismet_t, kismet_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, kismet_exec_t, kismet_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute kismet in the kismet domain, and
+## allow the specified role the kismet domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`kismet_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_run'($*)) dnl
+
+ gen_require(`
+ attribute_role kismet_roles;
+ ')
+
+ kismet_domtrans($1)
+ roleattribute $2 kismet_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read kismet pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_read_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_read_pid_files'($*)) dnl
+
+ gen_require(`
+ type kismet_runtime_t;
+ ')
+
+ files_search_pids($1)
+ allow $1 kismet_runtime_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_read_pid_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## kismet pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_manage_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_manage_pid_files'($*)) dnl
+
+ gen_require(`
+ type kismet_runtime_t;
+ ')
+
+ files_search_pids($1)
+ allow $1 kismet_runtime_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_manage_pid_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search kismet lib directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_search_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_search_lib'($*)) dnl
+
+ gen_require(`
+ type kismet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 kismet_var_lib_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_search_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read kismet lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type kismet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 kismet_var_lib_t:dir list_dir_perms;
+ allow $1 kismet_var_lib_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_read_lib_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## kismet lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_manage_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_manage_lib_files'($*)) dnl
+
+ gen_require(`
+ type kismet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_manage_lib_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## kismet lib content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_manage_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_manage_lib'($*)) dnl
+
+ gen_require(`
+ type kismet_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_dirs_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
+ manage_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
+ manage_lnk_files_pattern($1, kismet_var_lib_t, kismet_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_manage_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read kismet log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kismet_read_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_read_log'($*)) dnl
+
+ gen_require(`
+ type kismet_log_t;
+ ')
+
+ logging_search_logs($1)
+ read_files_pattern($1, kismet_log_t, kismet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_read_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Append kismet log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_append_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_append_log'($*)) dnl
+
+ gen_require(`
+ type kismet_log_t;
+ ')
+
+ logging_search_logs($1)
+ append_files_pattern($1, kismet_log_t, kismet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_append_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## kismet log content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kismet_manage_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_manage_log'($*)) dnl
+
+ gen_require(`
+ type kismet_log_t;
+ ')
+
+ logging_search_logs($1)
+ manage_dirs_pattern($1, kismet_log_t, kismet_log_t)
+ manage_files_pattern($1, kismet_log_t, kismet_log_t)
+ manage_lnk_files_pattern($1, kismet_log_t, kismet_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_manage_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an kismet environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`kismet_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kismet_admin'($*)) dnl
+
+ gen_require(`
+ type kismet_t, kismet_var_lib_t, kismet_runtime_t;
+ type kismet_log_t, kismet_tmp_t, kismet_initrc_exec_t;
+ ')
+
+ init_startstop_service($1, $2, kismet_t, kismet_initrc_exec_t)
+
+ ps_process_pattern($1, kismet_t)
+ allow $1 kismet_t:process { ptrace signal_perms };
+
+ files_search_var_lib($1)
+ admin_pattern($1, kismet_var_lib_t)
+
+ files_search_pids($1)
+ admin_pattern($1, kismet_runtime_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, kismet_log_t)
+
+ files_search_tmp($1)
+ admin_pattern($1, kismet_tmp_t)
+
+ kismet_run($1, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kismet_admin'($*)) dnl
+ ')
+
+## Decode DMI data for x86/ia64 bioses.
+
+########################################
+##
+## Execute dmidecode in the dmidecode domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dmidecode_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dmidecode_domtrans'($*)) dnl
+
+ gen_require(`
+ type dmidecode_t, dmidecode_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, dmidecode_exec_t, dmidecode_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dmidecode_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute dmidecode in the dmidecode
+## domain, and allow the specified
+## role the dmidecode domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`dmidecode_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dmidecode_run'($*)) dnl
+
+ gen_require(`
+ attribute_role dmidecode_roles;
+ ')
+
+ dmidecode_domtrans($1)
+ roleattribute $2 dmidecode_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dmidecode_run'($*)) dnl
+ ')
+
+## Policy for the kernel modules, kernel image, and bootloader.
+
+########################################
+##
+## Execute bootloader in the bootloader domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`bootloader_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_domtrans'($*)) dnl
+
+ gen_require(`
+ type bootloader_t, bootloader_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, bootloader_exec_t, bootloader_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute bootloader interactively and do
+## a domain transition to the bootloader domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`bootloader_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_run'($*)) dnl
+
+ gen_require(`
+ attribute_role bootloader_roles;
+ ')
+
+ bootloader_domtrans($1)
+ roleattribute $2 bootloader_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute bootloader in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bootloader_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_exec'($*)) dnl
+
+ gen_require(`
+ type bootloader_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, bootloader_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the bootloader configuration file.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bootloader_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_read_config'($*)) dnl
+
+ gen_require(`
+ type bootloader_etc_t;
+ ')
+
+ allow $1 bootloader_etc_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_read_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the bootloader
+## configuration file.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`bootloader_rw_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_rw_config'($*)) dnl
+
+ gen_require(`
+ type bootloader_etc_t;
+ ')
+
+ allow $1 bootloader_etc_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_rw_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the bootloader
+## temporary data in /tmp.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bootloader_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type bootloader_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ allow $1 bootloader_tmp_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_rw_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read and write the bootloader
+## runtime data.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bootloader_create_runtime_file',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bootloader_create_runtime_file'($*)) dnl
+
+ gen_require(`
+ type boot_runtime_t;
+ ')
+
+ allow $1 boot_runtime_t:file { create_file_perms rw_file_perms };
+ files_boot_filetrans($1, boot_runtime_t, file)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bootloader_create_runtime_file'($*)) dnl
+ ')
+
+## Aide filesystem integrity checker.
+
+########################################
+##
+## Execute aide in the aide domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`aide_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `aide_domtrans'($*)) dnl
+
+ gen_require(`
+ type aide_t, aide_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, aide_exec_t, aide_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `aide_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute aide programs in the AIDE
+## domain and allow the specified role
+## the AIDE domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`aide_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `aide_run'($*)) dnl
+
+ gen_require(`
+ attribute_role aide_roles;
+ ')
+
+ aide_domtrans($1)
+ roleattribute $2 aide_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `aide_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an aide environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`aide_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `aide_admin'($*)) dnl
+
+ gen_require(`
+ type aide_t, aide_db_t, aide_log_t;
+ ')
+
+ allow $1 aide_t:process { ptrace signal_perms };
+ ps_process_pattern($1, aide_t)
+
+ aide_run($1, $2)
+
+ files_list_etc($1)
+ admin_pattern($1, aide_db_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, aide_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `aide_admin'($*)) dnl
+ ')
+
+## Package Management System.
+
+########################################
+##
+## Execute emerge in the portage domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`portage_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_domtrans'($*)) dnl
+
+ gen_require(`
+ type portage_t, portage_exec_t;
+ type portage_tmp_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, portage_exec_t, portage_t)
+
+ can_exec($1, portage_tmp_t) # Portage does exectest
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute emerge in the portage domain,
+## and allow the specified role the
+## portage domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`portage_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_run'($*)) dnl
+
+ gen_require(`
+ attribute_role portage_roles;
+ ')
+
+ portage_domtrans($1)
+ roleattribute $2 portage_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Template for portage sandbox.
+##
+##
+##
+## Template for portage sandbox. Portage
+## does all compiling in the sandbox.
+##
+##
+##
+##
+## Domain Allowed Access
+##
+##
+#
+ define(`portage_compile_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_compile_domain'($*)) dnl
+
+ gen_require(`
+ class dbus send_msg;
+ type portage_devpts_t, portage_log_t, portage_sandbox_t, portage_srcrepo_t;
+ type portage_tmp_t, portage_tmpfs_t;
+ ')
+
+ allow $1 self:capability { chown dac_override dac_read_search fowner fsetid mknod net_raw setgid setuid };
+ dontaudit $1 self:capability sys_chroot;
+ allow $1 self:process { transition signal_perms getsched setsched getsession getpgid setpgid getcap setcap share getattr setfscreate noatsecure siginh setrlimit rlimitinh dyntransition execmem setkeycreate setsockcreate getrlimit };
+ allow $1 self:fd use;
+ allow $1 self:fifo_file rw_fifo_file_perms;
+ allow $1 self:shm create_shm_perms;
+ allow $1 self:sem create_sem_perms;
+ allow $1 self:msgq create_msgq_perms;
+ allow $1 self:msg { send receive };
+ allow $1 self:unix_dgram_socket create_socket_perms;
+ allow $1 self:unix_stream_socket create_stream_socket_perms;
+ allow $1 self:unix_dgram_socket sendto;
+ allow $1 self:unix_stream_socket connectto;
+ # really shouldnt need this
+ allow $1 self:tcp_socket create_stream_socket_perms;
+ allow $1 self:udp_socket create_socket_perms;
+ # misc networking stuff (esp needed for compiling perl):
+ allow $1 self:rawip_socket { create ioctl };
+ # needed for merging dbus:
+ allow $1 self:netlink_selinux_socket { bind create read };
+ allow $1 self:dbus send_msg;
+
+ allow $1 portage_devpts_t:chr_file { rw_chr_file_perms setattr_chr_file_perms };
+ term_create_pty($1, portage_devpts_t)
+
+ # write compile logs
+ allow $1 portage_log_t:dir setattr_dir_perms;
+ allow $1 portage_log_t:file { write_file_perms setattr_file_perms };
+
+ # Support live ebuilds (-9999)
+ manage_dirs_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
+ manage_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
+ manage_lnk_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
+ allow $1 portage_srcrepo_t:file map;
+
+ # run scripts out of the build directory
+ can_exec(portage_sandbox_t, portage_tmp_t)
+
+ manage_dirs_pattern($1, portage_tmp_t, portage_tmp_t)
+ manage_files_pattern($1, portage_tmp_t, portage_tmp_t)
+ manage_lnk_files_pattern($1, portage_tmp_t, portage_tmp_t)
+ manage_fifo_files_pattern($1, portage_tmp_t, portage_tmp_t)
+ manage_sock_files_pattern($1, portage_tmp_t, portage_tmp_t)
+ files_tmp_filetrans($1, portage_tmp_t, { dir file lnk_file sock_file fifo_file })
+ # SELinux-enabled programs running in the sandbox
+ allow $1 portage_tmp_t:file { relabel_file_perms map };
+ allow $1 portage_tmp_t:dir relabel_dir_perms;
+
+ manage_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
+ manage_lnk_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
+ manage_fifo_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
+ manage_sock_files_pattern($1, portage_tmpfs_t, portage_tmpfs_t)
+ allow $1 portage_tmpfs_t:file map;
+ fs_tmpfs_filetrans($1, portage_tmpfs_t, { dir file lnk_file sock_file fifo_file })
+
+ kernel_read_system_state($1)
+ kernel_read_network_state($1)
+ kernel_read_software_raid_state($1)
+ kernel_getattr_core_if($1)
+ kernel_getattr_message_if($1)
+ kernel_read_kernel_sysctls($1)
+
+ corecmd_exec_all_executables($1)
+
+ # really shouldnt need this but some packages test
+ # network access, such as during configure
+ # also distcc--need to reinvestigate confining distcc client
+ corenet_all_recvfrom_unlabeled($1)
+ corenet_all_recvfrom_netlabel($1)
+ corenet_tcp_sendrecv_generic_if($1)
+ corenet_udp_sendrecv_generic_if($1)
+ corenet_raw_sendrecv_generic_if($1)
+ corenet_tcp_sendrecv_generic_node($1)
+ corenet_udp_sendrecv_generic_node($1)
+ corenet_raw_sendrecv_generic_node($1)
+ corenet_tcp_connect_all_reserved_ports($1)
+ corenet_tcp_connect_distccd_port($1)
+ corenet_tcp_connect_git_port($1)
+
+ dev_read_sysfs($1)
+ dev_read_rand($1)
+ dev_read_urand($1)
+
+ domain_use_interactive_fds($1)
+ domain_dontaudit_read_all_domains_state($1)
+ # SELinux-aware installs doing relabels in the sandbox
+ domain_obj_id_change_exemption($1)
+
+ files_exec_etc_files($1)
+ files_exec_usr_src_files($1)
+ files_map_usr_files($1)
+
+ # Came up with bug #496328
+ fs_getattr_tmpfs($1)
+ fs_getattr_xattr_fs($1)
+ fs_list_noxattr_fs($1)
+ fs_read_noxattr_fs_files($1)
+ fs_read_noxattr_fs_symlinks($1)
+ fs_search_auto_mountpoints($1)
+
+ selinux_validate_context($1)
+ # needed for merging dbus:
+ selinux_compute_access_vector($1)
+
+ files_list_non_auth_dirs($1)
+ files_read_non_auth_files($1)
+ files_read_non_auth_symlinks($1)
+
+ libs_exec_lib_files($1)
+ # some config scripts use ldd
+ libs_exec_ld_so($1)
+ libs_exec_ldconfig($1)
+
+ logging_send_syslog_msg($1)
+
+ miscfiles_read_localization($1)
+
+ userdom_use_user_terminals($1)
+
+ # SELinux-enabled programs running in the sandbox
+ seutil_libselinux_linked($1)
+
+ # required by install
+ seutil_read_file_contexts($1)
+
+ tunable_policy(`portage_use_nfs',`
+ fs_getattr_nfs($1)
+ fs_manage_nfs_dirs($1)
+ fs_manage_nfs_files($1)
+ fs_manage_nfs_symlinks($1)
+ ')
+
+ ifdef(`TODO',`
+ # some gui ebuilds want to interact with X server, like xawtv
+ optional_policy(`
+ allow $1 xdm_xserver_tmp_t:dir { add_entry_dir_perms del_entry_dir_perms };
+ allow $1 xdm_xserver_tmp_t:sock_file { create_file_perms delete_file_perms write_file_perms };
+ ')
+ ') dnl end TODO
+
+ ifdef(`distro_gentoo',`
+ # Fix bug 496328
+ fs_getattr_tmpfs($1)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_compile_domain'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute tree management functions
+## (fetching, layman, ...) in the
+## portage fetch domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`portage_domtrans_fetch',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_domtrans_fetch'($*)) dnl
+
+ gen_require(`
+ type portage_fetch_t, portage_fetch_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, portage_fetch_exec_t, portage_fetch_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_domtrans_fetch'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute tree management functions
+## (fetching, layman, ...) in the
+## portage fetch domain, and allow
+## the specified role the portage
+## fetch domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`portage_run_fetch',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_run_fetch'($*)) dnl
+
+ gen_require(`
+ attribute_role portage_fetch_roles;
+ ')
+
+ portage_domtrans_fetch($1)
+ roleattribute $2 portage_fetch_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_run_fetch'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute gcc-config in the gcc config domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`portage_domtrans_gcc_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_domtrans_gcc_config'($*)) dnl
+
+ gen_require(`
+ type gcc_config_t, gcc_config_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, gcc_config_exec_t, gcc_config_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_domtrans_gcc_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute gcc-config in the gcc config
+## domain, and allow the specified role
+## the gcc_config domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`portage_run_gcc_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_run_gcc_config'($*)) dnl
+
+ gen_require(`
+ attribute_role gcc_config_roles;
+ ')
+
+ portage_domtrans_gcc_config($1)
+ roleattribute $2 gcc_config_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_run_gcc_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to use
+## portage file descriptors.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`portage_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type portage_t;
+ ')
+
+ dontaudit $1 portage_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search the
+## portage temporary directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`portage_dontaudit_search_tmp',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_dontaudit_search_tmp'($*)) dnl
+
+ gen_require(`
+ type portage_tmp_t;
+ ')
+
+ dontaudit $1 portage_tmp_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_dontaudit_search_tmp'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read and write
+## the portage temporary files.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`portage_dontaudit_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_dontaudit_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type portage_tmp_t;
+ ')
+
+ dontaudit $1 portage_tmp_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_dontaudit_rw_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the domain to run within an eselect module script.
+##
+##
+##
+## Domain to allow within an eselect module
+##
+##
+# Specific to Gentoo,
+# eselect modules allow users to switch between different flavors or versions
+# of underlying components. In return, eselect makes a wrapper binary which
+# makes the proper selections. If this binary is different from bin_t, it might
+# not hold the necessary privileges for the wrapper to function. However, just
+# marking the target binaries doesn't always work, since for python scripts the
+# wrapper doesn't execute it, but treats the target as a library.
+#
+ define(`portage_eselect_module',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_eselect_module'($*)) dnl
+
+ gen_require(`
+ attribute portage_eselect_domain;
+ ')
+
+ typeattribute $1 portage_eselect_domain;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_eselect_module'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read all portage files
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_ro_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_ro_role'($*)) dnl
+
+ portage_read_cache($2)
+ portage_read_config($2)
+ portage_read_db($2)
+ portage_read_ebuild($2)
+ portage_read_log($2)
+ portage_read_srcrepo($2)
+ portage_dontaudit_write_cache($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_ro_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage db files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_db'($*)) dnl
+
+ gen_require(`
+ type portage_db_t;
+ ')
+
+ files_search_var($1)
+ list_dirs_pattern($1, portage_db_t, portage_db_t)
+ read_files_pattern($1, portage_db_t, portage_db_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage cache files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_cache'($*)) dnl
+
+ gen_require(`
+ type portage_cache_t;
+ ')
+
+ files_search_var($1)
+ list_dirs_pattern($1, portage_cache_t, portage_cache_t)
+ read_files_pattern($1, portage_cache_t, portage_cache_t)
+ read_lnk_files_pattern($1, portage_cache_t, portage_cache_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage configuration files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_config'($*)) dnl
+
+ gen_require(`
+ type portage_conf_t;
+ ')
+
+ files_search_etc($1)
+ list_dirs_pattern($1, portage_conf_t, portage_conf_t)
+ read_files_pattern($1, portage_conf_t, portage_conf_t)
+ allow $1 portage_conf_t:file map;
+ read_lnk_files_pattern($1, portage_conf_t, portage_conf_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage ebuild files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_ebuild',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_ebuild'($*)) dnl
+
+ gen_require(`
+ type portage_ebuild_t;
+ ')
+
+ files_search_usr($1)
+ list_dirs_pattern($1, portage_ebuild_t, portage_ebuild_t)
+ read_files_pattern($1, portage_ebuild_t, portage_ebuild_t)
+ allow $1 portage_ebuild_t:file map;
+ read_lnk_files_pattern($1, portage_ebuild_t, portage_ebuild_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_ebuild'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage log files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_log'($*)) dnl
+
+ gen_require(`
+ type portage_log_t;
+ ')
+
+ logging_search_logs($1)
+ read_files_pattern($1, portage_log_t, portage_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read portage src repository files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_read_srcrepo',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_read_srcrepo'($*)) dnl
+
+ gen_require(`
+ type portage_ebuild_t, portage_srcrepo_t;
+ ')
+
+ files_search_usr($1)
+ list_dirs_pattern($1, portage_ebuild_t, portage_srcrepo_t)
+ read_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
+ allow $1 portage_srcrepo_t:file map;
+ read_lnk_files_pattern($1, portage_srcrepo_t, portage_srcrepo_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_read_srcrepo'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit writing portage cache files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`portage_dontaudit_write_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `portage_dontaudit_write_cache'($*)) dnl
+
+ gen_require(`
+ type portage_cache_t;
+ ')
+
+ dontaudit $1 portage_cache_t:dir { setattr write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `portage_dontaudit_write_cache'($*)) dnl
+ ')
+
+
+## Dump topology and locality information from hardware tables.
+
+########################################
+##
+## Execute hwloc dhwd in the hwloc dhwd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`hwloc_domtrans_dhwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `hwloc_domtrans_dhwd'($*)) dnl
+
+ gen_require(`
+ type hwloc_dhwd_t, hwloc_dhwd_exec_t;
+ ')
+
+ domtrans_pattern($1, hwloc_dhwd_exec_t, hwloc_dhwd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `hwloc_domtrans_dhwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute hwloc dhwd in the hwloc dhwd domain, and
+## allow the specified role the hwloc dhwd domain,
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`hwloc_run_dhwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `hwloc_run_dhwd'($*)) dnl
+
+ gen_require(`
+ attribute_role hwloc_dhwd_roles;
+ ')
+
+ hwloc_domtrans_dhwd($1)
+ roleattribute $2 hwloc_dhwd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `hwloc_run_dhwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute hwloc dhwd in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`hwloc_exec_dhwd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `hwloc_exec_dhwd'($*)) dnl
+
+ gen_require(`
+ type hwloc_dhwd_exec_t;
+ ')
+
+ can_exec($1, hwloc_dhwd_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `hwloc_exec_dhwd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read hwloc runtime files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`hwloc_read_runtime_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `hwloc_read_runtime_files'($*)) dnl
+
+ gen_require(`
+ type hwloc_runtime_t;
+ ')
+
+ files_search_pids($1)
+ read_files_pattern($1, hwloc_runtime_t, hwloc_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `hwloc_read_runtime_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an hwloc environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`hwloc_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `hwloc_admin'($*)) dnl
+
+ gen_require(`
+ type hwloc_dhwd_t, hwloc_runtime_t;
+ ')
+
+ allow $1 hwloc_dhwd_t:process { ptrace signal_perms };
+ ps_process_pattern($1, hwloc_dhwd_t)
+
+ admin_pattern($1, hwloc_runtime_t)
+ files_pid_filetrans($1, hwloc_runtime_t, dir, "hwloc")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `hwloc_admin'($*)) dnl
+ ')
+
+## System backup scripts.
+
+########################################
+##
+## Execute backup in the backup domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`backup_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `backup_domtrans'($*)) dnl
+
+ gen_require(`
+ type backup_t, backup_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, backup_exec_t, backup_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `backup_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute backup in the backup
+## domain, and allow the specified
+## role the backup domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`backup_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `backup_run'($*)) dnl
+
+ gen_require(`
+ attribute_role backup_roles;
+ ')
+
+ backup_domtrans($1)
+ roleattribute $2 backup_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `backup_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, and write backup
+## store files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`backup_manage_store_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `backup_manage_store_files'($*)) dnl
+
+ gen_require(`
+ type backup_store_t;
+ ')
+
+ files_search_var($1)
+ manage_files_pattern($1, backup_store_t, backup_store_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `backup_manage_store_files'($*)) dnl
+ ')
+
+## System log analyzer and reporter.
+
+########################################
+##
+## Read logwatch temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`logwatch_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logwatch_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type logwatch_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ allow $1 logwatch_tmp_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logwatch_read_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search logwatch cache directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`logwatch_search_cache_dir',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logwatch_search_cache_dir'($*)) dnl
+
+ gen_require(`
+ type logwatch_cache_t;
+ ')
+
+ files_search_var($1)
+ allow $1 logwatch_cache_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logwatch_search_cache_dir'($*)) dnl
+ ')
+
+## File integrity checker.
+
+########################################
+##
+## Execute tripwire in the tripwire domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tripwire_domtrans_tripwire',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_tripwire'($*)) dnl
+
+ gen_require(`
+ type tripwire_t, tripwire_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, tripwire_exec_t, tripwire_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_domtrans_tripwire'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute tripwire in the tripwire
+## domain, and allow the specified
+## role the tripwire domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`tripwire_run_tripwire',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_run_tripwire'($*)) dnl
+
+ gen_require(`
+ attribute_role tripwire_roles;
+ ')
+
+ tripwire_domtrans_tripwire($1)
+ roleattribute $2 tripwire_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_run_tripwire'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute twadmin in the twadmin domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tripwire_domtrans_twadmin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_twadmin'($*)) dnl
+
+ gen_require(`
+ type twadmin_t, twadmin_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, twadmin_exec_t, twadmin_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_domtrans_twadmin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute twadmin in the twadmin
+## domain, and allow the specified
+## role the twadmin domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`tripwire_run_twadmin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_run_twadmin'($*)) dnl
+
+ gen_require(`
+ attribute_role twadmin_roles;
+ ')
+
+ tripwire_domtrans_twadmin($1)
+ roleattribute $2 twadmin_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_run_twadmin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute twprint in the twprint domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tripwire_domtrans_twprint',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_twprint'($*)) dnl
+
+ gen_require(`
+ type twprint_t, twprint_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, twprint_exec_t, twprint_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_domtrans_twprint'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute twprint in the twprint
+## domain, and allow the specified
+## role the twprint domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`tripwire_run_twprint',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_run_twprint'($*)) dnl
+
+ gen_require(`
+ attribute_role twprint_roles;
+ ')
+
+ tripwire_domtrans_twprint($1)
+ roleattribute $2 twprint_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_run_twprint'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute siggen in the siggen domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tripwire_domtrans_siggen',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_domtrans_siggen'($*)) dnl
+
+ gen_require(`
+ type siggen_t, siggen_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, siggen_exec_t, siggen_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_domtrans_siggen'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute siggen in the siggen domain,
+## and allow the specified role
+## the siggen domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`tripwire_run_siggen',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tripwire_run_siggen'($*)) dnl
+
+ gen_require(`
+ attribute_role siggen_roles;
+ ')
+
+ tripwire_domtrans_siggen($1)
+ roleattribute $2 siggen_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tripwire_run_siggen'($*)) dnl
+ ')
+
+## Berkeley process accounting.
+
+########################################
+##
+## Transition to the accounting
+## management domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`acct_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `acct_domtrans'($*)) dnl
+
+ gen_require(`
+ type acct_t, acct_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, acct_exec_t, acct_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `acct_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute accounting management tools
+## in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`acct_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `acct_exec'($*)) dnl
+
+ gen_require(`
+ type acct_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, acct_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `acct_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute accounting management data
+## in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`acct_exec_data',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `acct_exec_data'($*)) dnl
+
+ gen_require(`
+ type acct_data_t;
+ ')
+
+ files_search_var($1)
+ can_exec($1, acct_data_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `acct_exec_data'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## process accounting data.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`acct_manage_data',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `acct_manage_data'($*)) dnl
+
+ gen_require(`
+ type acct_data_t;
+ ')
+
+ files_search_var($1)
+ manage_files_pattern($1, acct_data_t, acct_data_t)
+ manage_lnk_files_pattern($1, acct_data_t, acct_data_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `acct_manage_data'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an acct environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`acct_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `acct_admin'($*)) dnl
+
+ gen_require(`
+ type acct_t, acct_initrc_exec_t, acct_data_t;
+ ')
+
+ allow $1 acct_t:process { ptrace signal_perms };
+ ps_process_pattern($1, acct_t)
+
+ init_startstop_service($1, $2, acct_t, acct_initrc_exec_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, acct_data_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `acct_admin'($*)) dnl
+ ')
+
+## Cross platform network backup.
+
+########################################
+##
+## Execute bacula admin bacula
+## admin domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`bacula_domtrans_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bacula_domtrans_admin'($*)) dnl
+
+ gen_require(`
+ type bacula_admin_t, bacula_admin_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, bacula_admin_exec_t, bacula_admin_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bacula_domtrans_admin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute user interfaces in the
+## bacula admin domain, and allow the
+## specified role the bacula admin domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`bacula_run_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bacula_run_admin'($*)) dnl
+
+ gen_require(`
+ attribute_role bacula_admin_roles;
+ ')
+
+ bacula_domtrans_admin($1)
+ roleattribute $2 bacula_admin_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bacula_run_admin'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an bacula environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`bacula_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bacula_admin'($*)) dnl
+
+ gen_require(`
+ type bacula_t, bacula_etc_t, bacula_log_t;
+ type bacula_spool_t, bacula_var_lib_t;
+ type bacula_runtime_t, bacula_initrc_exec_t;
+ ')
+
+ allow $1 bacula_t:process { ptrace signal_perms };
+ ps_process_pattern($1, bacula_t)
+
+ init_startstop_service($1, $2, bacula_t, bacula_initrc_exec_t)
+
+ files_search_etc($1)
+ admin_pattern($1, bacula_etc_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, bacula_log_t)
+
+ files_search_var($1)
+ admin_pattern($1, bacula_spool_t)
+
+ files_search_var_lib($1)
+ admin_pattern($1, bacula_var_lib_t)
+
+ files_search_pids($1)
+ admin_pattern($1, bacula_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bacula_admin'($*)) dnl
+ ')
+
+## Initial system configuration utility.
+
+########################################
+##
+## Execute firstboot in the firstboot domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`firstboot_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_domtrans'($*)) dnl
+
+ gen_require(`
+ type firstboot_t, firstboot_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, firstboot_exec_t, firstboot_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute firstboot in the firstboot
+## domain, and allow the specified role
+## the firstboot domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`firstboot_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_run'($*)) dnl
+
+ gen_require(`
+ attribute_role firstboot_roles;
+ ')
+
+ firstboot_domtrans($1)
+ roleattribute $2 firstboot_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use firstboot file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`firstboot_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_use_fds'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ allow $1 firstboot_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to inherit
+## firstboot file descriptors.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`firstboot_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ dontaudit $1 firstboot_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Write firstboot unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`firstboot_write_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_write_pipes'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ allow $1 firstboot_t:fifo_file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_write_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and Write firstboot unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`firstboot_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ allow $1 firstboot_t:fifo_file { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attemps to read and
+## write firstboot unnamed pipes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`firstboot_dontaudit_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ dontaudit $1 firstboot_t:fifo_file { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attemps to read and
+## write firstboot unix domain
+## stream sockets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`firstboot_dontaudit_rw_stream_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firstboot_dontaudit_rw_stream_sockets'($*)) dnl
+
+ gen_require(`
+ type firstboot_t;
+ ')
+
+ dontaudit $1 firstboot_t:unix_stream_socket { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firstboot_dontaudit_rw_stream_sockets'($*)) dnl
+ ')
+
+## Cross-platform network configuration library.
+
+########################################
+##
+## Execute a domain transition to run ncftool.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`ncftool_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ncftool_domtrans'($*)) dnl
+
+ gen_require(`
+ type ncftool_t, ncftool_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, ncftool_exec_t, ncftool_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ncftool_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ncftool in the ncftool
+## domain, and allow the specified
+## role the ncftool domain.
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`ncftool_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ncftool_run'($*)) dnl
+
+ gen_require(`
+ attribute_role ncftool_roles;
+ ')
+
+ ncftool_domtrans($1)
+ roleattribute $2 ncftool_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ncftool_run'($*)) dnl
+ ')
+
+## System administration tool for networks.
+
+#######################################
+##
+## The template to define a cfengine domain.
+##
+##
+##
+## Domain prefix to be used.
+##
+##
+#
+ define(`cfengine_domain_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cfengine_domain_template'($*)) dnl
+
+ gen_require(`
+ attribute cfengine_domain;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type cfengine_$1_t, cfengine_domain;
+ type cfengine_$1_exec_t;
+ init_daemon_domain(cfengine_$1_t, cfengine_$1_exec_t)
+
+ ########################################
+ #
+ # Policy
+ #
+
+ auth_use_nsswitch(cfengine_$1_t)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cfengine_domain_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read cfengine lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`cfengine_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cfengine_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type cfengine_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, cfengine_var_lib_t, cfengine_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cfengine_read_lib_files'($*)) dnl
+ ')
+
+
+####################################
+##
+## Do not audit attempts to write
+## cfengine log files.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`cfengine_dontaudit_write_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cfengine_dontaudit_write_log_files'($*)) dnl
+
+ gen_require(`
+ type cfengine_log_t;
+ ')
+
+ dontaudit $1 cfengine_log_t:file write_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cfengine_dontaudit_write_log_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an cfengine environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`cfengine_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cfengine_admin'($*)) dnl
+
+ gen_require(`
+ attribute cfengine_domain;
+ type cfengine_initrc_exec_t, cfengine_log_t, cfengine_var_lib_t;
+ ')
+
+ allow $1 cfengine_domain:process { ptrace signal_perms };
+ ps_process_pattern($1, cfengine_domain)
+
+ init_startstop_service($1, $2, cfengine_domain, cfengine_initrc_exec_t)
+
+ files_search_var_lib($1)
+ admin_pattern($1, { cfengine_log_t cfengine_var_lib_t })
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cfengine_admin'($*)) dnl
+ ')
+
+## SUID/SGID program monitoring.
+
+########################################
+##
+## Read sxid log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`sxid_read_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sxid_read_log'($*)) dnl
+
+ gen_require(`
+ type sxid_log_t;
+ ')
+
+ logging_search_logs($1)
+ allow $1 sxid_log_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sxid_read_log'($*)) dnl
+ ')
+
+## List kernel modules of USB devices.
+
+########################################
+##
+## Execute usbmodules in the usbmodules domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usbmodules_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usbmodules_domtrans'($*)) dnl
+
+ gen_require(`
+ type usbmodules_t, usbmodules_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, usbmodules_exec_t, usbmodules_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usbmodules_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute usbmodules in the usbmodules
+## domain, and allow the specified
+## role the usbmodules domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`usbmodules_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usbmodules_run'($*)) dnl
+
+ gen_require(`
+ attribute_role usbmodules_roles;
+ ')
+
+ usbmodules_domtrans($1)
+ roleattribute $2 usbmodules_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usbmodules_run'($*)) dnl
+ ')
+
+## Rotates, compresses, removes and mails system log files.
+
+########################################
+##
+## Execute logrotate in the logrotate domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`logrotate_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_domtrans'($*)) dnl
+
+ gen_require(`
+ type logrotate_t, logrotate_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, logrotate_exec_t, logrotate_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute logrotate in the logrotate
+## domain, and allow the specified
+## role the logrotate domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`logrotate_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_run'($*)) dnl
+
+ gen_require(`
+ attribute_role logrotate_roles;
+ ')
+
+ logrotate_domtrans($1)
+ roleattribute $2 logrotate_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute logrotate in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`logrotate_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_exec'($*)) dnl
+
+ gen_require(`
+ type logrotate_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, logrotate_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use logrotate file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`logrotate_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_use_fds'($*)) dnl
+
+ gen_require(`
+ type logrotate_t;
+ ')
+
+ allow $1 logrotate_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to inherit
+## logrotate file descriptors.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`logrotate_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type logrotate_t;
+ ')
+
+ dontaudit $1 logrotate_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read logrotate temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`logrotate_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logrotate_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type logrotate_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ allow $1 logrotate_tmp_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logrotate_read_tmp_files'($*)) dnl
+ ')
+
+## Run shells with substitute user and group.
+
+#######################################
+##
+## Restricted su domain template.
+##
+##
+##
+## This template creates a derived domain which is allowed
+## to change the linux user id, to run shells as a different
+## user.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+#
+ define(`su_restricted_domain_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `su_restricted_domain_template'($*)) dnl
+
+ gen_require(`
+ type su_exec_t;
+ ')
+
+ type $1_su_t;
+ domain_entry_file($1_su_t, su_exec_t)
+ domain_type($1_su_t)
+ domain_interactive_fd($1_su_t)
+ role $3 types $1_su_t;
+
+ allow $2 $1_su_t:process signal;
+
+ allow $1_su_t self:capability { audit_control audit_write chown dac_override fowner net_bind_service setgid setuid sys_nice sys_resource };
+ dontaudit $1_su_t self:capability sys_tty_config;
+ allow $1_su_t self:key { search write };
+ allow $1_su_t self:process { setexec setsched setrlimit };
+ allow $1_su_t self:fifo_file rw_fifo_file_perms;
+ allow $1_su_t self:netlink_audit_socket { nlmsg_relay create_netlink_socket_perms };
+ allow $1_su_t self:unix_stream_socket create_stream_socket_perms;
+
+ # Transition from the user domain to this domain.
+ domtrans_pattern($2, su_exec_t, $1_su_t)
+
+ # By default, revert to the calling domain when a shell is executed.
+ corecmd_shell_domtrans($1_su_t,$2)
+ allow $2 $1_su_t:fd use;
+ allow $2 $1_su_t:fifo_file rw_file_perms;
+ allow $2 $1_su_t:process sigchld;
+
+ kernel_read_system_state($1_su_t)
+ kernel_read_kernel_sysctls($1_su_t)
+ kernel_search_key($1_su_t)
+ kernel_link_key($1_su_t)
+
+ # for SSP
+ dev_read_urand($1_su_t)
+
+ files_read_etc_files($1_su_t)
+ files_read_etc_runtime_files($1_su_t)
+ files_search_var_lib($1_su_t)
+ files_dontaudit_getattr_tmp_dirs($1_su_t)
+
+ # for the rootok check
+ selinux_compute_access_vector($1_su_t)
+
+ auth_domtrans_chk_passwd($1_su_t)
+ auth_dontaudit_read_shadow($1_su_t)
+ auth_use_nsswitch($1_su_t)
+ auth_rw_faillog($1_su_t)
+
+ domain_use_interactive_fds($1_su_t)
+
+ init_dontaudit_use_fds($1_su_t)
+ init_dontaudit_use_script_ptys($1_su_t)
+ # Write to utmp.
+ init_rw_utmp($1_su_t)
+ init_search_script_keys($1_su_t)
+
+ logging_send_syslog_msg($1_su_t)
+
+ miscfiles_read_localization($1_su_t)
+
+ ifdef(`distro_redhat',`
+ # RHEL5 and possibly newer releases incl. Fedora
+ auth_domtrans_upd_passwd($1_su_t)
+
+ optional_policy(`
+ locallogin_search_keys($1_su_t)
+ ')
+ ')
+
+ optional_policy(`
+ cron_read_pipes($1_su_t)
+ ')
+
+ optional_policy(`
+ kerberos_use($1_su_t)
+ ')
+
+ optional_policy(`
+ # used when the password has expired
+ usermanage_read_crack_db($1_su_t)
+ ')
+
+ ifdef(`distro_gentoo',`
+ # Fix bug 554080 - Allow su to query SELinux subsystem (netlink_selinux_socket)
+ allow $1_su_t self:netlink_selinux_socket { create bind read };
+ selinux_get_fs_mount($1_su_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `su_restricted_domain_template'($*)) dnl
+ ')
+
+
+#######################################
+##
+## The role template for the su module.
+##
+##
+##
+## The prefix of the user role (e.g., user
+## is the prefix for user_r).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`su_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `su_role_template'($*)) dnl
+
+ gen_require(`
+ type su_exec_t;
+ ')
+
+ type $1_su_t;
+ userdom_user_application_domain($1_su_t, su_exec_t)
+ domain_interactive_fd($1_su_t)
+ role $2 types $1_su_t;
+
+ allow $3 $1_su_t:process signal;
+
+ allow $1_su_t self:capability { audit_control audit_write chown dac_override fowner net_bind_service setgid setuid sys_nice sys_resource };
+ dontaudit $1_su_t self:capability { net_admin sys_tty_config };
+ allow $1_su_t self:process { setexec setsched setrlimit };
+ allow $1_su_t self:fifo_file rw_fifo_file_perms;
+ allow $1_su_t self:netlink_audit_socket { nlmsg_relay create_netlink_socket_perms };
+ allow $1_su_t self:key { search write };
+
+ allow $1_su_t $3:key search;
+
+ # Transition from the user domain to this domain.
+ domtrans_pattern($3, su_exec_t, $1_su_t)
+
+ ps_process_pattern($3, $1_su_t)
+
+ # By default, revert to the calling domain when a shell is executed.
+ corecmd_shell_domtrans($1_su_t, $3)
+ allow $3 $1_su_t:fd use;
+ allow $3 $1_su_t:fifo_file rw_file_perms;
+ allow $3 $1_su_t:process sigchld;
+
+ kernel_read_system_state($1_su_t)
+ kernel_read_kernel_sysctls($1_su_t)
+ kernel_search_key($1_su_t)
+ kernel_link_key($1_su_t)
+
+ # for SSP
+ dev_read_urand($1_su_t)
+
+ fs_search_auto_mountpoints($1_su_t)
+
+ # needed for pam_rootok
+ selinux_compute_access_vector($1_su_t)
+
+ auth_domtrans_chk_passwd($1_su_t)
+ auth_dontaudit_read_shadow($1_su_t)
+ auth_use_nsswitch($1_su_t)
+ auth_rw_faillog($1_su_t)
+
+ corecmd_search_bin($1_su_t)
+
+ domain_use_interactive_fds($1_su_t)
+
+ files_read_etc_files($1_su_t)
+ files_read_etc_runtime_files($1_su_t)
+ files_search_var_lib($1_su_t)
+ files_dontaudit_getattr_tmp_dirs($1_su_t)
+
+ init_dontaudit_use_fds($1_su_t)
+ init_dontaudit_read_state($1_su_t)
+ # Write to utmp.
+ init_rw_utmp($1_su_t)
+
+ mls_file_write_all_levels($1_su_t)
+
+ logging_send_syslog_msg($1_su_t)
+
+ miscfiles_read_localization($1_su_t)
+
+ # pam_unix is linked against libselinux
+ seutil_libselinux_linked($1_su_t)
+
+ userdom_use_user_terminals($1_su_t)
+ userdom_search_user_home_dirs($1_su_t)
+
+ ifdef(`distro_redhat',`
+ # RHEL5 and possibly newer releases incl. Fedora
+ auth_domtrans_upd_passwd($1_su_t)
+
+ optional_policy(`
+ locallogin_search_keys($1_su_t)
+ ')
+ ')
+
+ optional_policy(`
+ auth_use_pam_systemd($1_su_t)
+ ')
+
+ tunable_policy(`allow_polyinstantiation',`
+ fs_mount_xattr_fs($1_su_t)
+ fs_unmount_xattr_fs($1_su_t)
+ ')
+
+ tunable_policy(`use_nfs_home_dirs',`
+ fs_search_nfs($1_su_t)
+ ')
+
+ tunable_policy(`use_samba_home_dirs',`
+ fs_search_cifs($1_su_t)
+ ')
+
+ optional_policy(`
+ cron_read_pipes($1_su_t)
+ ')
+
+ optional_policy(`
+ kerberos_use($1_su_t)
+ ')
+
+ optional_policy(`
+ # used when the password has expired
+ usermanage_read_crack_db($1_su_t)
+ ')
+
+ # Modify .Xauthority file (via xauth program).
+ optional_policy(`
+ xserver_user_home_dir_filetrans_user_xauth($1_su_t)
+ xserver_domtrans_xauth($1_su_t)
+ ')
+
+ ifdef(`distro_gentoo',`
+ selinux_get_fs_mount($1_su_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `su_role_template'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute su in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`su_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `su_exec'($*)) dnl
+
+ gen_require(`
+ type su_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, su_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `su_exec'($*)) dnl
+ ')
+
+## Advanced Maryland Automatic Network Disk Archiver.
+
+########################################
+##
+## Execute a domain transition to run
+## Amanda recover.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`amanda_domtrans_recover',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_domtrans_recover'($*)) dnl
+
+ gen_require(`
+ type amanda_recover_t, amanda_recover_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, amanda_recover_exec_t, amanda_recover_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_domtrans_recover'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run
+## Amanda recover, and allow the specified
+## role the Amanda recover domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`amanda_run_recover',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_run_recover'($*)) dnl
+
+ gen_require(`
+ attribute_role amanda_recover_roles;
+ ')
+
+ amanda_domtrans_recover($1)
+ roleattribute $2 amanda_recover_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_run_recover'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search Amanda library directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`amanda_search_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_search_lib'($*)) dnl
+
+ gen_require(`
+ type amanda_usr_lib_t;
+ ')
+
+ files_search_usr($1)
+ allow $1 amanda_usr_lib_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_search_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read /etc/dumpdates.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`amanda_dontaudit_read_dumpdates',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_dontaudit_read_dumpdates'($*)) dnl
+
+ gen_require(`
+ type amanda_dumpdates_t;
+ ')
+
+ dontaudit $1 amanda_dumpdates_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_dontaudit_read_dumpdates'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write /etc/dumpdates.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`amanda_rw_dumpdates_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_rw_dumpdates_files'($*)) dnl
+
+ gen_require(`
+ type amanda_dumpdates_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 amanda_dumpdates_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_rw_dumpdates_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage Amanda library directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`amanda_manage_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_manage_lib'($*)) dnl
+
+ gen_require(`
+ type amanda_usr_lib_t;
+ ')
+
+ files_search_usr($1)
+ allow $1 amanda_usr_lib_t:dir manage_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_manage_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and append amanda log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`amanda_append_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_append_log_files'($*)) dnl
+
+ gen_require(`
+ type amanda_log_t;
+ ')
+
+ logging_search_logs($1)
+ allow $1 amanda_log_t:file { read_file_perms append_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_append_log_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Search Amanda var library directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`amanda_search_var_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `amanda_search_var_lib'($*)) dnl
+
+ gen_require(`
+ type amanda_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 amanda_var_lib_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `amanda_search_var_lib'($*)) dnl
+ ')
+
+## Prelink ELF shared library mappings.
+
+########################################
+##
+## Execute prelink in the prelink domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`prelink_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_domtrans'($*)) dnl
+
+ gen_require(`
+ type prelink_t, prelink_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, prelink_exec_t, prelink_t)
+
+ ifdef(`hide_broken_symptoms',`
+ dontaudit prelink_t $1:socket_class_set { read write };
+ dontaudit prelink_t $1:fifo_file setattr_fifo_file_perms;
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute prelink in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_exec'($*)) dnl
+
+ gen_require(`
+ type prelink_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, prelink_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute prelink in the prelink
+## domain, and allow the specified role
+## the prelink domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`prelink_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_run'($*)) dnl
+
+ gen_require(`
+ attribute_role prelink_roles;
+ ')
+
+ prelink_domtrans($1)
+ roleattribute $2 prelink_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make the specified file type prelinkable.
+##
+##
+##
+## File type to be prelinked.
+##
+##
+#
+ define(`prelink_object_file',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_object_file'($*)) dnl
+
+ gen_require(`
+ attribute prelink_object;
+ ')
+
+ typeattribute $1 prelink_object;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_object_file'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read prelink cache files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_read_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_read_cache'($*)) dnl
+
+ gen_require(`
+ type prelink_cache_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 prelink_cache_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_read_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete prelink cache files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_delete_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_delete_cache'($*)) dnl
+
+ gen_require(`
+ type prelink_cache_t;
+ ')
+
+ files_rw_etc_dirs($1)
+ allow $1 prelink_cache_t:file delete_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_delete_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## prelink log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_manage_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_manage_log'($*)) dnl
+
+ gen_require(`
+ type prelink_log_t;
+ ')
+
+ logging_search_logs($1)
+ manage_files_pattern($1, prelink_log_t, prelink_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_manage_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## prelink var_lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_manage_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_manage_lib'($*)) dnl
+
+ gen_require(`
+ type prelink_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_manage_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel from prelink lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_relabelfrom_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_relabelfrom_lib'($*)) dnl
+
+ gen_require(`
+ type prelink_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ relabelfrom_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_relabelfrom_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel prelink lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`prelink_relabel_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `prelink_relabel_lib'($*)) dnl
+
+ gen_require(`
+ type prelink_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ relabel_files_pattern($1, prelink_var_lib_t, prelink_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `prelink_relabel_lib'($*)) dnl
+ ')
+
+## ddcprobe retrieves monitor and graphics card information.
+
+########################################
+##
+## Execute ddcprobe in the ddcprobe domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`ddcprobe_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ddcprobe_domtrans'($*)) dnl
+
+ gen_require(`
+ type ddcprobe_t, ddcprobe_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, ddcprobe_exec_t, ddcprobe_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ddcprobe_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ddcprobe in the ddcprobe
+## domain, and allow the specified
+## role the ddcprobe domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`ddcprobe_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ddcprobe_run'($*)) dnl
+
+ gen_require(`
+ attribute_role ddcprobe_roles;
+ ')
+
+ ddcprobe_domtrans($1)
+ roleattribute $2 ddcprobe_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ddcprobe_run'($*)) dnl
+ ')
+
+## System-config-kdump GUI.
+## Tool to manage Bluetooth devices.
+
+########################################
+##
+## Execute blueman in the blueman domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`blueman_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `blueman_domtrans'($*)) dnl
+
+ gen_require(`
+ type blueman_t, blueman_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, blueman_exec_t, blueman_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `blueman_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## blueman over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`blueman_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `blueman_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type blueman_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 blueman_t:dbus send_msg;
+ allow blueman_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `blueman_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search blueman lib directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`blueman_search_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `blueman_search_lib'($*)) dnl
+
+ gen_require(`
+ type blueman_var_lib_t;
+ ')
+
+ allow $1 blueman_var_lib_t:dir search_dir_perms;
+ files_search_var_lib($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `blueman_search_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read blueman lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`blueman_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `blueman_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type blueman_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, blueman_var_lib_t, blueman_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `blueman_read_lib_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## blueman lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`blueman_manage_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `blueman_manage_lib_files'($*)) dnl
+
+ gen_require(`
+ type blueman_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, blueman_var_lib_t, blueman_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `blueman_manage_lib_files'($*)) dnl
+ ')
+
+## File system quota management.
+
+########################################
+##
+## Execute quota management tools in the quota domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`quota_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_domtrans'($*)) dnl
+
+ gen_require(`
+ type quota_t, quota_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, quota_exec_t, quota_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute quota management tools in
+## the quota domain, and allow the
+## specified role the quota domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`quota_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_run'($*)) dnl
+
+ gen_require(`
+ attribute_role quota_roles;
+ ')
+
+ quota_domtrans($1)
+ roleattribute $2 quota_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_run'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute quota nld in the quota nld domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`quota_domtrans_nld',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_domtrans_nld'($*)) dnl
+
+ gen_require(`
+ type quota_nld_t, quota_nld_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, quota_nld_exec_t, quota_nld_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_domtrans_nld'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## quota db files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`quota_manage_db_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_manage_db_files'($*)) dnl
+
+ gen_require(`
+ type quota_db_t;
+ ')
+
+ allow $1 quota_db_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_manage_db_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create specified objects in specified
+## directories with a type transition to
+## the quota db file type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Directory to transition on.
+##
+##
+##
+##
+## The object class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`quota_spec_filetrans_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_spec_filetrans_db'($*)) dnl
+
+ gen_require(`
+ type quota_db_t;
+ ')
+
+ filetrans_pattern($1, $2, quota_db_t, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_spec_filetrans_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to get attributes
+## of filesystem quota data files.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`quota_dontaudit_getattr_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_dontaudit_getattr_db'($*)) dnl
+
+ gen_require(`
+ type quota_db_t;
+ ')
+
+ dontaudit $1 quota_db_t:file getattr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_dontaudit_getattr_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## quota flag files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`quota_manage_flags',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_manage_flags'($*)) dnl
+
+ gen_require(`
+ type quota_flag_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, quota_flag_t, quota_flag_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_manage_flags'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an quota environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`quota_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `quota_admin'($*)) dnl
+
+ gen_require(`
+ type quota_nld_t, quota_t, quota_db_t;
+ type quota_nld_initrc_exec_t, quota_flag_t, quota_nld_runtime_t;
+ ')
+
+ allow $1 { quota_nld_t quota_t }:process { ptrace signal_perms };
+ ps_process_pattern($1, { quota_nld_t quota_t })
+
+ init_startstop_service($1, $2, quota_nld_t, quota_nld_initrc_exec_t)
+
+ files_list_all($1)
+ admin_pattern($1, { quota_db_t quota_flag_t quota_nld_runtime_t })
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `quota_admin'($*)) dnl
+ ')
+
+## Virtual Private Networking client.
+
+########################################
+##
+## Execute vpn clients in the vpnc domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`vpn_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_domtrans'($*)) dnl
+
+ gen_require(`
+ type vpnc_t, vpnc_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, vpnc_exec_t, vpnc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute vpn clients in the vpnc
+## domain, and allow the specified
+## role the vpnc domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`vpn_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_run'($*)) dnl
+
+ gen_require(`
+ attribute_role vpnc_roles;
+ ')
+
+ vpn_domtrans($1)
+ roleattribute $2 vpnc_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send kill signals to vpnc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vpn_kill',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_kill'($*)) dnl
+
+ gen_require(`
+ type vpnc_t;
+ ')
+
+ allow $1 vpnc_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_kill'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to vpnc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vpn_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_signal'($*)) dnl
+
+ gen_require(`
+ type vpnc_t;
+ ')
+
+ allow $1 vpnc_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send null signals to vpnc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vpn_signull',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_signull'($*)) dnl
+
+ gen_require(`
+ type vpnc_t;
+ ')
+
+ allow $1 vpnc_t:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_signull'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## vpnc over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vpn_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type vpnc_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 vpnc_t:dbus send_msg;
+ allow vpnc_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabelfrom from vpnc socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vpn_relabelfrom_tun_socket',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vpn_relabelfrom_tun_socket'($*)) dnl
+
+ gen_require(`
+ type vpnc_t;
+ ')
+
+ allow $1 vpnc_t:tun_socket relabelfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vpn_relabelfrom_tun_socket'($*)) dnl
+ ')
+
+## Set up, mount/unmount, and delete an swap file.
+
+########################################
+##
+## Dontaudit acces to the swap file.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`dphysswapfile_dontaudit_read_swap',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dphysswapfile_dontaudit_read_swap'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ gen_require(`
+ type dphysswapfile_swap_t;
+ ')
+
+ dontaudit $1 dphysswapfile_swap_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dphysswapfile_dontaudit_read_swap'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an dphys-swapfile environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`dphysswapfile_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dphysswapfile_admin'($*)) dnl
+
+ gen_require(`
+ type dphysswapfile_t, dphysswapfile_conf_t;
+ type dphysswapfile_initrc_exec_t, dphysswapfile_unit_t;
+ ')
+
+ admin_process_pattern($1, dphysswapfile_t)
+
+ init_startstop_service($1, $2, dphysswapfile_t, dphysswapfile_initrc_exec_t, dphysswapfile_unit_t)
+
+ files_search_etc($1)
+ admin_pattern($1, dphysswapfile_conf_t)
+
+ # do not grant access to swap file for now
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dphysswapfile_admin'($*)) dnl
+ ')
+
+## rkhunter - rootkit checker.
+
+########################################
+##
+## Execute a domain transition to run rkhunter.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rkhunter_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rkhunter_domtrans'($*)) dnl
+
+ gen_require(`
+ type rkhunter_t, rkhunter_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, rkhunter_exec_t, rkhunter_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rkhunter_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute rkhunter in the rkhunter domain,
+## and allow the specified role
+## the rkhunter domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`rkhunter_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rkhunter_run'($*)) dnl
+
+ gen_require(`
+ attribute_role rkhunter_roles;
+ ')
+
+ rkhunter_domtrans($1)
+ roleattribute $2 rkhunter_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rkhunter_run'($*)) dnl
+ ')
+
+## chkrootkit - rootkit checker.
+
+########################################
+##
+## Execute a domain transition to run chkrootkit.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`chkrootkit_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chkrootkit_domtrans'($*)) dnl
+
+ gen_require(`
+ type chkrootkit_t, chkrootkit_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, chkrootkit_exec_t, chkrootkit_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chkrootkit_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute chkrootkit in the chkrootkit domain,
+## and allow the specified role
+## the chkrootkit domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`chkrootkit_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chkrootkit_run'($*)) dnl
+
+ gen_require(`
+ attribute_role chkrootkit_roles;
+ ')
+
+ chkrootkit_domtrans($1)
+ roleattribute $2 chkrootkit_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chkrootkit_run'($*)) dnl
+ ')
+
+## Redhat package manager.
+
+########################################
+##
+## Execute rpm in the rpm domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rpm_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_domtrans'($*)) dnl
+
+ gen_require(`
+ type rpm_t, rpm_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, rpm_exec_t, rpm_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute debuginfo install
+## in the rpm domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rpm_debuginfo_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_debuginfo_domtrans'($*)) dnl
+
+ gen_require(`
+ type rpm_t, debuginfo_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, debuginfo_exec_t, rpm_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_debuginfo_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute rpm scripts in the rpm script domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rpm_domtrans_script',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_domtrans_script'($*)) dnl
+
+ gen_require(`
+ type rpm_script_t;
+ ')
+
+ corecmd_shell_domtrans($1, rpm_script_t)
+
+ allow rpm_script_t $1:fd use;
+ allow rpm_script_t $1:fifo_file rw_fifo_file_perms;
+ allow rpm_script_t $1:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_domtrans_script'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute rpm in the rpm domain,
+## and allow the specified roles the
+## rpm domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`rpm_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_run'($*)) dnl
+
+ gen_require(`
+ attribute_role rpm_roles;
+ ')
+
+ rpm_domtrans($1)
+ roleattribute $2 rpm_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the rpm in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_exec'($*)) dnl
+
+ gen_require(`
+ type rpm_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, rpm_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send null signals to rpm.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_signull',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_signull'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ ')
+
+ allow $1 rpm_t:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_signull'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use file descriptors from rpm.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_use_fds'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ ')
+
+ allow $1 rpm_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read rpm unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_read_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_read_pipes'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ ')
+
+ allow $1 rpm_t:fifo_file read_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_read_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write rpm unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ ')
+
+ allow $1 rpm_t:fifo_file rw_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## rpm over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 rpm_t:dbus send_msg;
+ allow rpm_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and
+## receive messages from rpm over dbus.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`rpm_dontaudit_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_dontaudit_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type rpm_t;
+ class dbus send_msg;
+ ')
+
+ dontaudit $1 rpm_t:dbus send_msg;
+ dontaudit rpm_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_dontaudit_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## rpm script over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_script_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_script_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type rpm_script_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 rpm_script_t:dbus send_msg;
+ allow rpm_script_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_script_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search rpm log directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_search_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_search_log'($*)) dnl
+
+ gen_require(`
+ type rpm_log_t;
+ ')
+
+ logging_search_logs($1)
+ allow $1 rpm_log_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_search_log'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Append rpm log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_append_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_append_log'($*)) dnl
+
+ gen_require(`
+ type rpm_log_t;
+ ')
+
+ logging_search_logs($1)
+ append_files_pattern($1, rpm_log_t, rpm_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_append_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## rpm log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_log'($*)) dnl
+
+ gen_require(`
+ type rpm_log_t;
+ ')
+
+ logging_rw_generic_log_dirs($1)
+ allow $1 rpm_log_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_log'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use rpm script file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_use_script_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_use_script_fds'($*)) dnl
+
+ gen_require(`
+ type rpm_script_t;
+ ')
+
+ allow $1 rpm_script_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_use_script_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## rpm script temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_script_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_script_tmp_files'($*)) dnl
+
+ gen_require(`
+ type rpm_script_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ manage_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_script_tmp_files'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Append rpm temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_append_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_append_tmp_files'($*)) dnl
+
+ gen_require(`
+ type rpm_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ append_files_pattern($1, rpm_tmp_t, rpm_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_append_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## rpm temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_tmp_files'($*)) dnl
+
+ gen_require(`
+ type rpm_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ manage_files_pattern($1, rpm_tmp_t, rpm_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read rpm script temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_read_script_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_read_script_tmp_files'($*)) dnl
+
+ gen_require(`
+ type rpm_script_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ read_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
+ read_lnk_files_pattern($1, rpm_script_tmp_t, rpm_script_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_read_script_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read rpm cache content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_read_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_read_cache'($*)) dnl
+
+ gen_require(`
+ type rpm_var_cache_t;
+ ')
+
+ files_search_var($1)
+ allow $1 rpm_var_cache_t:dir list_dir_perms;
+ read_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
+ read_lnk_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_read_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## rpm cache content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_cache'($*)) dnl
+
+ gen_require(`
+ type rpm_var_cache_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_dirs_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
+ manage_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
+ manage_lnk_files_pattern($1, rpm_var_cache_t, rpm_var_cache_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read rpm lib content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_read_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_read_db'($*)) dnl
+
+ gen_require(`
+ type rpm_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 rpm_var_lib_t:dir list_dir_perms;
+ read_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+ read_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+ allow $1 rpm_var_lib_t:file map;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_read_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete rpm lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_delete_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_delete_db'($*)) dnl
+
+ gen_require(`
+ type rpm_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ delete_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_delete_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## rpm lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_db'($*)) dnl
+
+ gen_require(`
+ type rpm_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+ manage_lnk_files_pattern($1, rpm_var_lib_t, rpm_var_lib_t)
+ allow $1 rpm_var_lib_t:file map;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to create, read,
+## write, and delete rpm lib content.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`rpm_dontaudit_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_dontaudit_manage_db'($*)) dnl
+
+ gen_require(`
+ type rpm_var_lib_t;
+ ')
+
+ dontaudit $1 rpm_var_lib_t:dir rw_dir_perms;
+ dontaudit $1 rpm_var_lib_t:file manage_file_perms;
+ dontaudit $1 rpm_var_lib_t:lnk_file manage_lnk_file_perms;
+ dontaudit $1 rpm_var_lib_t:file map;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_dontaudit_manage_db'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Read rpm pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_read_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_read_pid_files'($*)) dnl
+
+ gen_require(`
+ type rpm_runtime_t;
+ ')
+
+ read_files_pattern($1, rpm_runtime_t, rpm_runtime_t)
+ files_search_pids($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_read_pid_files'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Create, read, write, and delete
+## rpm pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rpm_manage_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_manage_pid_files'($*)) dnl
+
+ gen_require(`
+ type rpm_runtime_t;
+ ')
+
+ manage_files_pattern($1, rpm_runtime_t, rpm_runtime_t)
+ files_search_pids($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_manage_pid_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create specified objects in pid directories
+## with the rpm pid file type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`rpm_pid_filetrans_rpm_pid',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_pid_filetrans_rpm_pid'($*)) dnl
+
+ gen_require(`
+ type rpm_runtime_t;
+ ')
+
+ files_pid_filetrans($1, rpm_runtime_t, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_pid_filetrans_rpm_pid'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an rpm environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`rpm_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rpm_admin'($*)) dnl
+
+ gen_require(`
+ type rpm_t, rpm_script_t, rpm_initrc_exec_t;
+ type rpm_var_cache_t, rpm_var_lib_t, rpm_lock_t;
+ type rpm_log_t, rpm_tmpfs_t, rpm_tmp_t, rpm_runtime_t;
+ type rpm_script_tmp_t, rpm_script_tmpfs_t, rpm_file_t;
+ ')
+
+ allow $1 { rpm_t rpm_script_t }:process { ptrace signal_perms };
+ ps_process_pattern($1, { rpm_t rpm_script_t })
+
+ init_startstop_service($1, $2, rpm_t, rpm_initrc_exec_t)
+
+ admin_pattern($1, rpm_file_t)
+
+ files_list_var($1)
+ admin_pattern($1, rpm_var_cache_t)
+
+ files_list_tmp($1)
+ admin_pattern($1, { rpm_tmp_t rpm_script_tmp_t })
+
+ files_list_var_lib($1)
+ admin_pattern($1, rpm_var_lib_t)
+
+ files_search_locks($1)
+ admin_pattern($1, rpm_lock_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, rpm_log_t)
+
+ files_list_pids($1)
+ admin_pattern($1, rpm_runtime_t)
+
+ fs_search_tmpfs($1)
+ admin_pattern($1, { rpm_tmpfs_t rpm_script_tmpfs_t })
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rpm_admin'($*)) dnl
+ ')
+
+## Hardware detection and configuration tools.
+
+########################################
+##
+## Execute kudzu in the kudzu domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`kudzu_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kudzu_domtrans'($*)) dnl
+
+ gen_require(`
+ type kudzu_t, kudzu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, kudzu_exec_t, kudzu_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kudzu_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute kudzu in the kudzu domain, and
+## allow the specified role the kudzu domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`kudzu_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kudzu_run'($*)) dnl
+
+ gen_require(`
+ attribute_role kudzu_roles;
+ ')
+
+ kudzu_domtrans($1)
+ roleattribute $2 kudzu_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kudzu_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get attributes of kudzu executable files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kudzu_getattr_exec_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kudzu_getattr_exec_files'($*)) dnl
+
+ gen_require(`
+ type kudzu_exec_t;
+ ')
+
+ allow $1 kudzu_exec_t:file getattr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kudzu_getattr_exec_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an kudzu environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`kudzu_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kudzu_admin'($*)) dnl
+
+ gen_require(`
+ type kudzu_t, kudzu_initrc_exec_t, kudzu_runtime_t;
+ type kudzu_tmp_t;
+ ')
+
+ allow $1 kudzu_t:process { ptrace signal_perms };
+ ps_process_pattern($1, kudzu_t)
+
+ init_startstop_service($1, $2, kudzu_t, kudzu_initrc_exec_t)
+
+ files_search_tmp($1)
+ admin_pattern($1, kudzu_tmp_t)
+
+ files_search_pids($1)
+ admin_pattern($1, kudzu_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kudzu_admin'($*)) dnl
+ ')
+
+## configuration management suite.
+
+########################################
+##
+## Execute bcfg2 in the bcfg2 domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`bcfg2_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_domtrans'($*)) dnl
+
+ gen_require(`
+ type bcfg2_t, bcfg2_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, bcfg2_exec_t, bcfg2_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute bcfg2 server in the bcfg2 domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`bcfg2_initrc_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_initrc_domtrans'($*)) dnl
+
+ gen_require(`
+ type bcfg2_initrc_exec_t;
+ ')
+
+ init_labeled_script_domtrans($1, bcfg2_initrc_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_initrc_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search bcfg2 lib directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bcfg2_search_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_search_lib'($*)) dnl
+
+ gen_require(`
+ type bcfg2_var_lib_t;
+ ')
+
+ allow $1 bcfg2_var_lib_t:dir search_dir_perms;
+ files_search_var_lib($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_search_lib'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read bcfg2 lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bcfg2_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type bcfg2_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_read_lib_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## bcfg2 lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bcfg2_manage_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_manage_lib_files'($*)) dnl
+
+ gen_require(`
+ type bcfg2_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_manage_lib_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## bcfg2 lib directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`bcfg2_manage_lib_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_manage_lib_dirs'($*)) dnl
+
+ gen_require(`
+ type bcfg2_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_dirs_pattern($1, bcfg2_var_lib_t, bcfg2_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_manage_lib_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an bcfg2 environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`bcfg2_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bcfg2_admin'($*)) dnl
+
+ gen_require(`
+ type bcfg2_t, bcfg2_initrc_exec_t, bcfg2_var_lib_t;
+ type bcfg2_runtime_t;
+ ')
+
+ allow $1 bcfg2_t:process { ptrace signal_perms };
+ ps_process_pattern($1, bcfg2_t)
+
+ init_startstop_service($1, $2, bcfg2_t, bcfg2_initrc_exec_t)
+
+ files_search_pids($1)
+ admin_pattern($1, bcfg2_runtime_t)
+
+ files_search_var_lib($1)
+ admin_pattern($1, bcfg2_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bcfg2_admin'($*)) dnl
+ ')
+
+## Network traffic graphing.
+
+########################################
+##
+## Read mrtg configuration
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mrtg_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mrtg_read_config'($*)) dnl
+
+ gen_require(`
+ type mrtg_etc_t;
+ ')
+
+ allow $1 mrtg_etc_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mrtg_read_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create and append mrtg log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mrtg_append_create_logs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mrtg_append_create_logs'($*)) dnl
+
+ gen_require(`
+ type mrtg_log_t;
+ ')
+
+ logging_search_logs($1)
+ append_files_pattern($1, mrtg_log_t, mrtg_log_t)
+ create_files_pattern($1, mrtg_log_t, mrtg_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mrtg_append_create_logs'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an mrtg environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`mrtg_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mrtg_admin'($*)) dnl
+
+ gen_require(`
+ type mrtg_t, mrtg_runtime_t, mrtg_initrc_exec_t;
+ type mrtg_var_lib_t, mrtg_lock_t, mrtg_log_t;
+ type mrtg_etc_t;
+ ')
+
+ allow $1 mrtg_t:process { ptrace signal_perms };
+ ps_process_pattern($1, mrtg_t)
+
+ init_startstop_service($1, $2, mrtg_t, mrtg_initrc_exec_t)
+
+ files_search_etc($1)
+ admin_pattern($1, mrtg_etc_t)
+
+ files_search_locks($1)
+ admin_pattern($1, mrtg_lock_t)
+
+ logging_search_logs($1)
+ admin_pattern($1, mrtg_log_t)
+
+ files_search_pids($1)
+ admin_pattern($1, mrtg_runtime_t)
+
+ files_search_var_lib($1)
+ admin_pattern($1, mrtg_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mrtg_admin'($*)) dnl
+ ')
+
+## Shoreline Firewall high-level tool for configuring netfilter.
+
+########################################
+##
+## Execute a domain transition to run shorewall.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`shorewall_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_domtrans'($*)) dnl
+
+ gen_require(`
+ type shorewall_t, shorewall_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, shorewall_exec_t, shorewall_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_domtrans'($*)) dnl
+ ')
+
+
+######################################
+##
+## Execute a domain transition to run shorewall
+## using executables from /var/lib.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`shorewall_lib_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_lib_domtrans'($*)) dnl
+
+ gen_require(`
+ type shorewall_t, shorewall_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ domtrans_pattern($1, shorewall_var_lib_t, shorewall_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_lib_domtrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read shorewall configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_read_config'($*)) dnl
+
+ gen_require(`
+ type shorewall_etc_t;
+ ')
+
+ files_search_etc($1)
+ read_files_pattern($1, shorewall_etc_t, shorewall_etc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_read_config'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read shorewall pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_read_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_read_pid_files'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_read_pid_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read and write shorewall pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_rw_pid_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_rw_pid_files'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_rw_pid_files'($*)) dnl
+ ')
+
+
+######################################
+##
+## Read shorewall lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type shorewall_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, shorewall_var_lib_t, shorewall_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_read_lib_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read and write shorewall lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_rw_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_rw_lib_files'($*)) dnl
+
+ gen_require(`
+ type shorewall_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ rw_files_pattern($1, shorewall_var_lib_t, shorewall_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_rw_lib_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read shorewall temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`shorewall_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type shorewall_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ read_files_pattern($1, shorewall_tmp_t, shorewall_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_read_tmp_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## All of the rules required to
+## administrate an shorewall environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`shorewall_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `shorewall_admin'($*)) dnl
+
+ gen_require(`
+ type shorewall_t, shorewall_lock_t, shorewall_log_t;
+ type shorewall_exec_t, shorewall_initrc_exec_t, shorewall_var_lib_t;
+ type shorewall_tmp_t, shorewall_etc_t;
+ ')
+
+ allow $1 shorewall_t:process { ptrace signal_perms };
+ ps_process_pattern($1, shorewall_t)
+
+ init_startstop_service($1, $2, shorewall_t, shorewall_initrc_exec_t)
+
+ can_exec($1, shorewall_exec_t)
+
+ files_list_etc($1)
+ admin_pattern($1, shorewall_etc_t)
+
+ files_list_locks($1)
+ admin_pattern($1, shorewall_lock_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, shorewall_log_t)
+
+ files_list_var_lib($1)
+ admin_pattern($1, shorewall_var_lib_t)
+
+ files_list_tmp($1)
+ admin_pattern($1, shorewall_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `shorewall_admin'($*)) dnl
+ ')
+
+## run real-mode video BIOS code to alter hardware state.
+
+########################################
+##
+## Execute vbetool in the vbetool domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`vbetool_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vbetool_domtrans'($*)) dnl
+
+ gen_require(`
+ type vbetool_t, vbetool_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, vbetool_exec_t, vbetool_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vbetool_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute vbetool in the vbetool
+## domain, and allow the specified
+## role the vbetool domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`vbetool_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vbetool_run'($*)) dnl
+
+ gen_require(`
+ attribute_role vbetool_roles;
+ ')
+
+ vbetool_domtrans($1)
+ roleattribute $2 vbetool_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vbetool_run'($*)) dnl
+ ')
+
+## Debian package manager.
+
+########################################
+##
+## Execute dpkg programs in the dpkg domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dpkg_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_domtrans'($*)) dnl
+
+ gen_require(`
+ type dpkg_t, dpkg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, dpkg_exec_t, dpkg_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Transition to dpkg_t when NNP has been set
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_nnp_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_nnp_domtrans'($*)) dnl
+
+ gen_require(`
+ type dpkg_t;
+ ')
+
+ dpkg_domtrans($1)
+ allow $1 dpkg_t:process2 nnp_transition;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_nnp_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute dpkg programs in the dpkg domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`dpkg_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_run'($*)) dnl
+
+ gen_require(`
+ attribute_role dpkg_roles;
+ ')
+
+ dpkg_domtrans($1)
+ roleattribute $2 dpkg_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the dkpg in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_exec'($*)) dnl
+
+ gen_require(`
+ type dpkg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, dpkg_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute dpkg_script programs in
+## the dpkg_script domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dpkg_domtrans_script',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_domtrans_script'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_t;
+ ')
+
+ corecmd_shell_domtrans($1, dpkg_script_t)
+ allow dpkg_script_t $1:fd use;
+ allow dpkg_script_t $1:fifo_file rw_file_perms;
+ allow dpkg_script_t $1:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_domtrans_script'($*)) dnl
+ ')
+
+
+########################################
+##
+## access dpkg_script fifos
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`dpkg_script_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_script_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_t;
+ ')
+
+ allow $1 dpkg_script_t:fd use;
+ allow $1 dpkg_script_t:fifo_file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_script_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use file descriptors from dpkg.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_use_fds'($*)) dnl
+
+ gen_require(`
+ type dpkg_t;
+ ')
+
+ allow $1 dpkg_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read from unnamed dpkg pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_read_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_read_pipes'($*)) dnl
+
+ gen_require(`
+ type dpkg_t;
+ ')
+
+ allow $1 dpkg_t:fifo_file read_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_read_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write unnamed dpkg pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type dpkg_t;
+ ')
+
+ allow $1 dpkg_t:fifo_file rw_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use file descriptors
+## from dpkg scripts.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_use_script_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_use_script_fds'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_t;
+ ')
+
+ allow $1 dpkg_script_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_use_script_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Inherit and use file descriptors
+## from dpkg scripts.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_script_rw_inherited_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_script_rw_inherited_pipes'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_t;
+ ')
+
+ allow $1 dpkg_script_t:fd use;
+ allow $1 dpkg_script_t:fifo_file rw_inherited_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_script_rw_inherited_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read dpkg package database content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_read_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_read_db'($*)) dnl
+
+ gen_require(`
+ type dpkg_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 dpkg_var_lib_t:dir list_dir_perms;
+ read_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
+ read_lnk_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_read_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## dpkg package database content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_manage_db'($*)) dnl
+
+ gen_require(`
+ type dpkg_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
+ manage_lnk_files_pattern($1, dpkg_var_lib_t, dpkg_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_manage_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to create,
+## read, write, and delete dpkg
+## package database content.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`dpkg_dontaudit_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_dontaudit_manage_db'($*)) dnl
+
+ gen_require(`
+ type dpkg_var_lib_t;
+ ')
+
+ dontaudit $1 dpkg_var_lib_t:dir rw_dir_perms;
+ dontaudit $1 dpkg_var_lib_t:file manage_file_perms;
+ dontaudit $1 dpkg_var_lib_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_dontaudit_manage_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## dpkg lock files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_lock_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_lock_db'($*)) dnl
+
+ gen_require(`
+ type dpkg_lock_t, dpkg_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 dpkg_var_lib_t:dir list_dir_perms;
+ allow $1 dpkg_lock_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_lock_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## manage dpkg_script_tmp_t files and dirs
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_manage_script_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_manage_script_tmp_files'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ allow $1 dpkg_script_tmp_t:dir manage_dir_perms;
+ allow $1 dpkg_script_tmp_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_manage_script_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## map dpkg_script_tmp_t files
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_map_script_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_map_script_tmp_files'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_tmp_t;
+ ')
+
+ allow $1 dpkg_script_tmp_t:file map;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_map_script_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## read dpkg_script_tmp_t links
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dpkg_read_script_tmp_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dpkg_read_script_tmp_symlinks'($*)) dnl
+
+ gen_require(`
+ type dpkg_script_tmp_t;
+ ')
+
+ allow $1 dpkg_script_tmp_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dpkg_read_script_tmp_symlinks'($*)) dnl
+ ')
+
+## Advanced package tool.
+
+########################################
+##
+## Execute apt programs in the apt domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`apt_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_domtrans'($*)) dnl
+
+ gen_require(`
+ type apt_t, apt_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, apt_exec_t, apt_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the apt in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_exec'($*)) dnl
+
+ gen_require(`
+ type apt_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, apt_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute apt programs in the apt domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`apt_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_run'($*)) dnl
+
+ gen_require(`
+ attribute_role apt_roles;
+ ')
+
+ apt_domtrans($1)
+ roleattribute $2 apt_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Use apt file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_use_fds'($*)) dnl
+
+ gen_require(`
+ type apt_t;
+ ')
+
+ allow $1 apt_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to use
+## apt file descriptors.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`apt_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type apt_t;
+ ')
+
+ dontaudit $1 apt_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read apt unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_read_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_read_pipes'($*)) dnl
+
+ gen_require(`
+ type apt_t;
+ ')
+
+ allow $1 apt_t:fifo_file read_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_read_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write apt unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type apt_t;
+ ')
+
+ allow $1 apt_t:fifo_file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write apt ptys.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_use_ptys',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_use_ptys'($*)) dnl
+
+ gen_require(`
+ type apt_devpts_t;
+ ')
+
+ allow $1 apt_devpts_t:chr_file rw_term_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_use_ptys'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read apt package cache content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_read_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_read_cache'($*)) dnl
+
+ gen_require(`
+ type apt_var_cache_t;
+ ')
+
+ files_search_var($1)
+ allow $1 apt_var_cache_t:dir list_dir_perms;
+ allow $1 apt_var_cache_t:file mmap_read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_read_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete apt package cache content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_manage_cache',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_manage_cache'($*)) dnl
+
+ gen_require(`
+ type apt_var_cache_t;
+ ')
+
+ files_search_var($1)
+ allow $1 apt_var_cache_t:dir manage_dir_perms;
+ allow $1 apt_var_cache_t:file { manage_file_perms map };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_manage_cache'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read apt package database content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_read_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_read_db'($*)) dnl
+
+ gen_require(`
+ type apt_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ allow $1 apt_var_lib_t:dir list_dir_perms;
+ read_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
+ read_lnk_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_read_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## apt package database content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`apt_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_manage_db'($*)) dnl
+
+ gen_require(`
+ type apt_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
+ manage_lnk_files_pattern($1, apt_var_lib_t, apt_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_manage_db'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to create,
+## read, write, and delete apt
+## package database content.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`apt_dontaudit_manage_db',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `apt_dontaudit_manage_db'($*)) dnl
+
+ gen_require(`
+ type apt_var_lib_t;
+ ')
+
+ dontaudit $1 apt_var_lib_t:dir rw_dir_perms;
+ dontaudit $1 apt_var_lib_t:file manage_file_perms;
+ dontaudit $1 apt_var_lib_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `apt_dontaudit_manage_db'($*)) dnl
+ ')
+
+## Time zone updater.
+
+########################################
+##
+## Execute a domain transition to run tzdata.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`tzdata_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tzdata_domtrans'($*)) dnl
+
+ gen_require(`
+ type tzdata_t, tzdata_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, tzdata_exec_t, tzdata_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tzdata_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute tzdata in the tzdata domain,
+## and allow the specified role
+## the tzdata domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`tzdata_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tzdata_run'($*)) dnl
+
+ gen_require(`
+ attribute_role tzdata_roles;
+ ')
+
+ tzdata_domtrans($1)
+ roleattribute $2 tzdata_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tzdata_run'($*)) dnl
+ ')
+
+## Utilities for configuring the Linux ethernet bridge.
+
+########################################
+##
+## Execute a domain transition to run brctl.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`brctl_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `brctl_domtrans'($*)) dnl
+
+ gen_require(`
+ type brctl_t, brctl_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, brctl_exec_t, brctl_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `brctl_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute brctl in the brctl domain, and
+## allow the specified role the brctl domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`brctl_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `brctl_run'($*)) dnl
+
+ gen_require(`
+ attribute_role brctl_roles;
+ ')
+
+ brctl_domtrans($1)
+ roleattribute $2 brctl_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `brctl_run'($*)) dnl
+ ')
+
+## Kernel crash dumping mechanism.
+
+######################################
+##
+## Execute kdump in the kdump domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`kdump_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdump_domtrans'($*)) dnl
+
+ gen_require(`
+ type kdump_t, kdump_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, kdump_exec_t, kdump_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdump_domtrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute kdump init scripts in
+## the init script domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`kdump_initrc_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdump_initrc_domtrans'($*)) dnl
+
+ gen_require(`
+ type kdump_initrc_exec_t;
+ ')
+
+ init_labeled_script_domtrans($1, kdump_initrc_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdump_initrc_domtrans'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Read kdump configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kdump_read_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdump_read_config'($*)) dnl
+
+ gen_require(`
+ type kdump_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 kdump_etc_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdump_read_config'($*)) dnl
+ ')
+
+
+####################################
+##
+## Create, read, write, and delete
+## kdmup configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kdump_manage_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdump_manage_config'($*)) dnl
+
+ gen_require(`
+ type kdump_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 kdump_etc_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdump_manage_config'($*)) dnl
+ ')
+
+
+######################################
+##
+## All of the rules required to
+## administrate an kdump environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`kdump_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdump_admin'($*)) dnl
+
+ gen_require(`
+ type kdump_t, kdump_etc_t, kdumpctl_tmp_t;
+ type kdump_initrc_exec_t, kdumpctl_t;
+ ')
+
+ allow $1 { kdump_t kdumpctl_t }:process { ptrace signal_perms };
+ ps_process_pattern($1, { kdump_t kdumpctl_t })
+
+ init_startstop_service($1, $2, kdump_t, kdump_initrc_exec_t)
+
+ files_search_etc($1)
+ admin_pattern($1, kdump_etc_t)
+
+ files_search_tmp($1)
+ admin_pattern($1, kdumpctl_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdump_admin'($*)) dnl
+ ')
+
+## The Fedora hardware profiler client.
+## sigrok signal analysis software suite.
+
+########################################
+##
+## Execute sigrok in its domain.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`sigrok_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `sigrok_run'($*)) dnl
+
+ gen_require(`
+ type sigrok_t, sigrok_exec_t;
+ attribute_role sigrok_roles;
+ ')
+
+ roleattribute $1 sigrok_roles;
+ domtrans_pattern($2, sigrok_exec_t, sigrok_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `sigrok_run'($*)) dnl
+ ')
+
+## Policy for Mozilla and related web browsers.
+
+########################################
+##
+## Role access for mozilla.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`mozilla_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_role'($*)) dnl
+
+ gen_require(`
+ type mozilla_t, mozilla_exec_t, mozilla_home_t;
+ type mozilla_tmp_t, mozilla_tmpfs_t, mozilla_plugin_tmp_t;
+ type mozilla_plugin_tmpfs_t, mozilla_plugin_home_t;
+ attribute_role mozilla_roles;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 mozilla_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, mozilla_exec_t, mozilla_t)
+
+ allow $2 mozilla_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
+ ps_process_pattern($2, mozilla_t)
+
+ allow mozilla_t $2:process signull;
+ allow mozilla_t $2:unix_stream_socket connectto;
+
+ allow $2 mozilla_t:fd use;
+ allow $2 mozilla_t:shm rw_shm_perms;
+
+ stream_connect_pattern($2, mozilla_tmpfs_t, mozilla_tmpfs_t, mozilla_t)
+
+ allow $2 { mozilla_home_t mozilla_plugin_home_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { mozilla_home_t mozilla_plugin_home_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
+
+ filetrans_pattern($2, mozilla_home_t, mozilla_plugin_home_t, dir, "plugins")
+
+ allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { mozilla_tmp_t mozilla_plugin_tmp_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+
+ allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 { mozilla_tmpfs_t mozilla_plugin_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ optional_policy(`
+ mozilla_dbus_chat($2)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Role access for mozilla plugin.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`mozilla_role_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_role_plugin'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_t, mozilla_plugin_tmp_t, mozilla_plugin_tmpfs_t;
+ type mozilla_plugin_rw_t, mozilla_plugin_config_t, mozilla_home_t;
+ ')
+
+ mozilla_run_plugin($2, $1)
+ mozilla_run_plugin_config($2, $1)
+
+ allow $2 { mozilla_plugin_t mozilla_plugin_config_t }:process { ptrace signal_perms };
+ ps_process_pattern($2, { mozilla_plugin_t mozilla_plugin_config_t })
+
+ allow $2 mozilla_plugin_t:unix_stream_socket rw_socket_perms;
+ allow $2 mozilla_plugin_t:fd use;
+
+ stream_connect_pattern($2, mozilla_plugin_tmpfs_t, mozilla_plugin_tmpfs_t, mozilla_plugin_t)
+
+ allow mozilla_plugin_t $2:process signull;
+ allow mozilla_plugin_t $2:unix_stream_socket { connectto rw_socket_perms };
+ allow mozilla_plugin_t $2:unix_dgram_socket { sendto rw_socket_perms };
+ allow mozilla_plugin_t $2:shm { rw_shm_perms destroy };
+ allow mozilla_plugin_t $2:sem create_sem_perms;
+
+ allow $2 mozilla_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 mozilla_home_t:file { manage_file_perms relabel_file_perms };
+ allow $2 mozilla_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".galeon")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".mozilla")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".netscape")
+ userdom_user_home_dir_filetrans($2, mozilla_home_t, dir, ".phoenix")
+
+ allow $2 mozilla_plugin_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 mozilla_plugin_tmp_t:file { manage_file_perms relabel_file_perms };
+ allow $2 mozilla_plugin_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+
+ allow $2 mozilla_plugin_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 mozilla_plugin_tmpfs_t:file { manage_file_perms relabel_file_perms };
+ allow $2 mozilla_plugin_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 mozilla_plugin_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow $2 mozilla_plugin_rw_t:dir list_dir_perms;
+ allow $2 mozilla_plugin_rw_t:file read_file_perms;
+ allow $2 mozilla_plugin_rw_t:lnk_file read_lnk_file_perms;
+
+ can_exec($2, mozilla_plugin_rw_t)
+
+ optional_policy(`
+ mozilla_dbus_chat_plugin($2)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_role_plugin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read mozilla home directory content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_read_user_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_read_user_home'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t;
+ ')
+
+ list_dirs_pattern($1, mozilla_home_t, mozilla_home_t)
+ read_files_pattern($1, mozilla_home_t, mozilla_home_t)
+ userdom_search_user_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_read_user_home'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Read mozilla home directory files
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_read_user_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_read_user_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 mozilla_home_t:dir list_dir_perms;
+ allow $1 mozilla_home_t:file read_file_perms;
+ allow $1 mozilla_home_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_read_user_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Write mozilla home directory files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_write_user_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_write_user_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ write_files_pattern($1, mozilla_home_t, mozilla_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_write_user_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read and
+## write mozilla home directory files.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`mozilla_dontaudit_rw_user_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_rw_user_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t;
+ ')
+
+ dontaudit $1 mozilla_home_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_rw_user_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempt to Create,
+## read, write, and delete mozilla
+## home directory content.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`mozilla_dontaudit_manage_user_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_manage_user_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t;
+ ')
+
+ dontaudit $1 mozilla_home_t:dir manage_dir_perms;
+ dontaudit $1 mozilla_home_t:file manage_file_perms;
+ dontaudit $1 mozilla_home_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_manage_user_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mozilla plugin home directory files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_exec_user_plugin_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_exec_user_plugin_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_home_t, mozilla_plugin_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ exec_files_pattern($1, { mozilla_home_t mozilla_plugin_home_t }, mozilla_plugin_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_exec_user_plugin_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mozilla plugin home directory file
+## text relocation.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_execmod_user_plugin_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_execmod_user_plugin_home_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_home_t;
+ ')
+
+ allow $1 mozilla_plugin_home_t:file execmod;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_execmod_user_plugin_home_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read temporary mozilla files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_tmp_t;
+ ')
+
+ read_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_read_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run mozilla in the mozilla domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mozilla_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_domtrans'($*)) dnl
+
+ gen_require(`
+ type mozilla_t, mozilla_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mozilla_exec_t, mozilla_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to
+## run mozilla plugin.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mozilla_domtrans_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_domtrans_plugin'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_t, mozilla_plugin_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mozilla_plugin_exec_t, mozilla_plugin_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_domtrans_plugin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mozilla plugin in the
+## mozilla plugin domain, and allow
+## the specified role the mozilla
+## plugin domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`mozilla_run_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_run_plugin'($*)) dnl
+
+ gen_require(`
+ attribute_role mozilla_plugin_roles;
+ ')
+
+ mozilla_domtrans_plugin($1)
+ roleattribute $2 mozilla_plugin_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_run_plugin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to
+## run mozilla plugin config.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mozilla_domtrans_plugin_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_domtrans_plugin_config'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_config_t, mozilla_plugin_config_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mozilla_plugin_config_exec_t, mozilla_plugin_config_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_domtrans_plugin_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mozilla plugin config in
+## the mozilla plugin config domain,
+## and allow the specified role the
+## mozilla plugin config domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`mozilla_run_plugin_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_run_plugin_config'($*)) dnl
+
+ gen_require(`
+ attribute_role mozilla_plugin_config_roles;
+ ')
+
+ mozilla_domtrans_plugin_config($1)
+ roleattribute $2 mozilla_plugin_config_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_run_plugin_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## mozilla over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type mozilla_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 mozilla_t:dbus send_msg;
+ allow mozilla_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## mozilla plugin over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_dbus_chat_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_dbus_chat_plugin'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 mozilla_plugin_t:dbus send_msg;
+ allow mozilla_plugin_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_dbus_chat_plugin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write mozilla TCP sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_rw_tcp_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_rw_tcp_sockets'($*)) dnl
+
+ gen_require(`
+ type mozilla_t;
+ ')
+
+ allow $1 mozilla_t:tcp_socket rw_socket_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_rw_tcp_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## mozilla plugin rw files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_manage_plugin_rw_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_manage_plugin_rw_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_rw_t;
+ ')
+
+ libs_search_lib($1)
+ manage_files_pattern($1, mozilla_plugin_rw_t, mozilla_plugin_rw_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_manage_plugin_rw_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read mozilla_plugin tmpfs files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_plugin_read_tmpfs_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_plugin_read_tmpfs_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_tmpfs_t;
+ ')
+
+ fs_search_tmpfs($1)
+ allow $1 mozilla_plugin_tmpfs_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_plugin_read_tmpfs_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete mozilla_plugin tmpfs files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_plugin_delete_tmpfs_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_plugin_delete_tmpfs_files'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_tmpfs_t;
+ ')
+
+ fs_search_tmpfs($1)
+ allow $1 mozilla_plugin_tmpfs_t:file delete_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_plugin_delete_tmpfs_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read/write to mozilla's tmp fifo files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`mozilla_rw_tmp_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_rw_tmp_pipes'($*)) dnl
+
+ gen_require(`
+ type mozilla_tmp_t;
+ ')
+
+ rw_fifo_files_pattern($1, mozilla_tmp_t, mozilla_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_rw_tmp_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## generic mozilla plugin home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mozilla_manage_generic_plugin_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_manage_generic_plugin_home_content'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 mozilla_plugin_home_t:dir manage_dir_perms;
+ allow $1 mozilla_plugin_home_t:file manage_file_perms;
+ allow $1 mozilla_plugin_home_t:fifo_file manage_fifo_file_perms;
+ allow $1 mozilla_plugin_home_t:lnk_file manage_lnk_file_perms;
+ allow $1 mozilla_plugin_home_t:sock_file manage_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_manage_generic_plugin_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the generic mozilla
+## plugin home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`mozilla_home_filetrans_plugin_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_home_filetrans_plugin_home'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, mozilla_plugin_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_home_filetrans_plugin_home'($*)) dnl
+ ')
+
+
+# This is gentoo specific but cannot use ifdef distro_gentoo
+
+########################################
+##
+## Do not audit use of mozilla file descriptors
+##
+##
+##
+## Domain to dont audit access from
+##
+##
+#
+ define(`mozilla_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type mozilla_t;
+ ')
+
+ dontaudit $1 mozilla_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send messages to mozilla plugin unix datagram sockets
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`mozilla_send_dgram_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mozilla_send_dgram_plugin'($*)) dnl
+
+ gen_require(`
+ type mozilla_plugin_t;
+ ')
+
+ allow $1 mozilla_plugin_t:unix_dgram_socket sendto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mozilla_send_dgram_plugin'($*)) dnl
+ ')
+
+## Openoffice suite.
+
+############################################################
+##
+## Role access for openoffice.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`ooffice_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_role'($*)) dnl
+
+ gen_require(`
+ attribute_role ooffice_roles;
+ type ooffice_t, ooffice_exec_t;
+ ')
+
+ roleattribute $1 ooffice_roles;
+
+ allow ooffice_t $2:unix_stream_socket connectto;
+
+ domtrans_pattern($2, ooffice_exec_t, ooffice_t)
+
+ allow $2 ooffice_t:process { ptrace signal_perms };
+ ps_process_pattern($2, ooffice_t)
+
+ optional_policy(`
+ ooffice_dbus_chat($2)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run openoffice in its own domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`ooffice_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_domtrans'($*)) dnl
+
+ gen_require(`
+ type ooffice_t, ooffice_exec_t;
+ ')
+
+ domtrans_pattern($1, ooffice_exec_t, ooffice_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to execute
+## files in temporary directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`ooffice_dontaudit_exec_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_dontaudit_exec_tmp_files'($*)) dnl
+
+ gen_require(`
+ type ooffice_tmp_t;
+ ')
+
+ dontaudit $1 ooffice_tmp_t:file exec_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_dontaudit_exec_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write temporary
+## openoffice files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`ooffice_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type ooffice_tmp_t;
+ ')
+
+ rw_files_pattern($1, ooffice_tmp_t, ooffice_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_rw_tmp_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Send and receive dbus messages
+## from and to the openoffice
+## domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`ooffice_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type ooffice_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 ooffice_t:dbus send_msg;
+ allow ooffice_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to openoffice using a
+## unix domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`ooffice_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ooffice_stream_connect'($*)) dnl
+
+ gen_require(`
+ type ooffice_t, ooffice_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, ooffice_tmp_t, ooffice_tmp_t, ooffice_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ooffice_stream_connect'($*)) dnl
+ ')
+
+## Telepathy communications framework.
+
+#######################################
+##
+## The template to define a telepathy domain.
+##
+##
+##
+## Domain prefix to be used.
+##
+##
+#
+ define(`telepathy_domain_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_domain_template'($*)) dnl
+
+ gen_require(`
+ attribute telepathy_domain, telepathy_executable, telepathy_tmp_content;
+ ')
+
+ type telepathy_$1_t, telepathy_domain;
+ type telepathy_$1_exec_t, telepathy_executable;
+ userdom_user_application_domain(telepathy_$1_t, telepathy_$1_exec_t)
+
+ type telepathy_$1_tmp_t, telepathy_tmp_content;
+ userdom_user_tmp_file(telepathy_$1_tmp_t)
+
+ optional_policy(`
+ wm_application_domain(telepathy_$1_t, telepathy_$1_exec_t)
+ ')
+
+ auth_use_nsswitch(telepathy_$1_t)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_domain_template'($*)) dnl
+ ')
+
+
+#######################################
+##
+## The role template for the telepathy module.
+##
+##
+##
+## This template creates a derived domains which are used
+## for window manager applications.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`telepathy_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_role_template'($*)) dnl
+
+ gen_require(`
+ attribute telepathy_domain, telepathy_tmp_content;
+ type telepathy_gabble_t, telepathy_sofiasip_t, telepathy_idle_t;
+ type telepathy_mission_control_t, telepathy_salut_t, telepathy_sunshine_t;
+ type telepathy_stream_engine_t, telepathy_msn_t, telepathy_gabble_exec_t;
+ type telepathy_sofiasip_exec_t, telepathy_idle_exec_t;
+ type telepathy_logger_t, telepathy_logger_exec_t;
+ type telepathy_mission_control_exec_t, telepathy_salut_exec_t;
+ type telepathy_sunshine_exec_t, telepathy_stream_engine_exec_t;
+ type telepathy_msn_exec_t;
+
+ type telepathy_mission_control_xdg_cache_t, telepathy_xdg_cache_t, telepathy_logger_xdg_cache_t;
+ type telepathy_gabble_xdg_cache_t, telepathy_mission_control_t, telepathy_xdg_data_t;
+ type telepathy_mission_control_xdg_data_t, telepathy_sunshine_home_t, telepathy_logger_xdg_data_t;
+ type telepathy_mission_control_home_t;
+ ')
+
+ role $2 types telepathy_domain;
+
+ allow $3 telepathy_domain:process { ptrace signal_perms };
+ ps_process_pattern($3, telepathy_domain)
+
+ telepathy_gabble_stream_connect($3)
+ telepathy_msn_stream_connect($3)
+ telepathy_salut_stream_connect($3)
+
+ dbus_spec_session_domain($1, telepathy_gabble_t, telepathy_gabble_exec_t)
+ dbus_spec_session_domain($1, telepathy_sofiasip_t, telepathy_sofiasip_exec_t)
+ dbus_spec_session_domain($1, telepathy_idle_t, telepathy_idle_exec_t)
+ dbus_spec_session_domain($1, telepathy_logger_t, telepathy_logger_exec_t)
+ dbus_spec_session_domain($1, telepathy_mission_control_t, telepathy_mission_control_exec_t)
+ dbus_spec_session_domain($1, telepathy_salut_t, telepathy_salut_exec_t)
+ dbus_spec_session_domain($1, telepathy_sunshine_t, telepathy_sunshine_exec_t)
+ dbus_spec_session_domain($1, telepathy_stream_engine_t, telepathy_stream_engine_exec_t)
+ dbus_spec_session_domain($1, telepathy_msn_t, telepathy_msn_exec_t)
+
+ allow $3 { telepathy_mission_control_xdg_cache_t telepathy_xdg_cache_t telepathy_logger_xdg_cache_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 { telepathy_gabble_xdg_cache_t telepathy_mission_control_home_t telepathy_xdg_data_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 { telepathy_mission_control_xdg_data_t telepathy_sunshine_home_t telepathy_logger_xdg_data_t }:dir { manage_dir_perms relabel_dir_perms };
+
+ allow $3 { telepathy_mission_control_xdg_cache_t telepathy_xdg_cache_t telepathy_logger_xdg_cache_t }:file { manage_file_perms relabel_file_perms };
+ allow $3 { telepathy_gabble_xdg_cache_t telepathy_mission_control_home_t telepathy_xdg_data_t }:file { manage_file_perms relabel_file_perms };
+ allow $3 { telepathy_mission_control_xdg_data_t telepathy_sunshine_home_t telepathy_logger_xdg_data_t }:file { manage_file_perms relabel_file_perms };
+
+ filetrans_pattern($3, telepathy_xdg_cache_t, telepathy_gabble_xdg_cache_t, dir, "gabble")
+ # gnome_cache_filetrans($3, telepathy_gabble_cache_home_t, dir, "wocky")
+
+ filetrans_pattern($3, telepathy_xdg_cache_t, telepathy_logger_xdg_cache_t, dir, "logger")
+ # gnome_data_filetrans($3, telepathy_logger_data_home_t, dir, "TpLogger")
+
+ userdom_user_home_dir_filetrans($3, telepathy_mission_control_home_t, dir, ".mission-control")
+ filetrans_pattern($3, telepathy_xdg_data_t, telepathy_mission_control_xdg_data_t, dir, "mission-control")
+ # gnome_cache_filetrans($3, telepathy_mission_control_cache_home_t, file, ".mc_connections")
+
+ userdom_user_home_dir_filetrans($3, telepathy_sunshine_home_t, dir, ".telepathy-sunshine")
+
+ # gnome_cache_filetrans($3, telepathy_cache_home_t, dir, "telepathy")
+ # gnome_data_filetrans($3, telepathy_data_home_t, dir, "telepathy")
+
+ allow $3 telepathy_tmp_content:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 telepathy_tmp_content:file { manage_file_perms relabel_file_perms };
+ allow $3 telepathy_tmp_content:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ telepathy_mission_control_dbus_chat($3)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to gabble with a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_gabble_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_gabble_stream_connect'($*)) dnl
+
+ gen_require(`
+ type telepathy_gabble_t, telepathy_gabble_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, telepathy_gabble_tmp_t, telepathy_gabble_tmp_t, telepathy_gabble_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_gabble_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send dbus messages to and from
+## gabble.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_gabble_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_gabble_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type telepathy_gabble_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 telepathy_gabble_t:dbus send_msg;
+ allow telepathy_gabble_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_gabble_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send dbus messages to and from
+## mission control.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_mission_control_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_mission_control_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type telepathy_mission_control_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 telepathy_mission_control_t:dbus send_msg;
+ allow telepathy_mission_control_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_mission_control_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read mission control process state files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_mission_control_read_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_mission_control_read_state'($*)) dnl
+
+ gen_require(`
+ type telepathy_mission_control_t;
+ ')
+
+ kernel_search_proc($1)
+ allow $1 telepathy_mission_control_t:dir list_dir_perms;
+ allow $1 telepathy_mission_control_t:file read_file_perms;
+ allow $1 telepathy_mission_control_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_mission_control_read_state'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Connect to msn with a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_msn_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_msn_stream_connect'($*)) dnl
+
+ gen_require(`
+ type telepathy_msn_t, telepathy_msn_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, telepathy_msn_tmp_t, telepathy_msn_tmp_t, telepathy_msn_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_msn_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to salut with a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`telepathy_salut_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `telepathy_salut_stream_connect'($*)) dnl
+
+ gen_require(`
+ type telepathy_salut_t, telepathy_salut_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, telepathy_salut_tmp_t, telepathy_salut_tmp_t, telepathy_salut_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `telepathy_salut_stream_connect'($*)) dnl
+ ')
+
+## Tools for managing and hosting git repositories.
+
+#######################################
+##
+## Execute a domain transition to run gitosis.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`gitosis_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gitosis_domtrans'($*)) dnl
+
+ gen_require(`
+ type gitosis_t, gitosis_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, gitosis_exec_t, gitosis_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gitosis_domtrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute gitosis-serve in the
+## gitosis domain, and allow the
+## specified role the gitosis domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`gitosis_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gitosis_run'($*)) dnl
+
+ gen_require(`
+ attribute_role gitosis_roles;
+ ')
+
+ gitosis_domtrans($1)
+ roleattribute $2 gitosis_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gitosis_run'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read gitosis lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gitosis_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gitosis_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type gitosis_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
+ read_lnk_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
+ list_dirs_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gitosis_read_lib_files'($*)) dnl
+ ')
+
+
+######################################
+##
+## Create, read, write, and delete
+## gitosis lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gitosis_manage_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gitosis_manage_lib_files'($*)) dnl
+
+ gen_require(`
+ type gitosis_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ manage_files_pattern($1, gitosis_var_lib_t, gitosis_var_lib_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gitosis_manage_lib_files'($*)) dnl
+ ')
+
+## Update database for mlocate.
+
+########################################
+##
+## Read locate lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`locate_read_lib_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `locate_read_lib_files'($*)) dnl
+
+ gen_require(`
+ type locate_var_lib_t;
+ ')
+
+ files_search_var_lib($1)
+ read_files_pattern($1, locate_var_lib_t, locate_var_lib_t)
+ allow $1 locate_var_lib_t:dir list_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `locate_read_lib_files'($*)) dnl
+ ')
+
+## High quality television application.
+
+########################################
+##
+## Role access for tvtime
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`tvtime_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `tvtime_role'($*)) dnl
+
+ gen_require(`
+ attribute_role tvtime_roles;
+ type tvtime_t, tvtime_exec_t, tvtime_tmp_t;
+ type tvtime_home_t, tvtime_tmpfs_t;
+ ')
+
+ roleattribute $1 tvtime_roles;
+
+ domtrans_pattern($2, tvtime_exec_t, tvtime_t)
+
+ ps_process_pattern($2, tvtime_t)
+ allow $2 tvtime_t:process { ptrace signal_perms };
+
+ allow $2 { tvtime_home_t tvtime_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { tvtime_home_t tvtime_tmpfs_t tvtime_tmp_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { tvtime_home_t tvtime_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 tvtime_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 tvtime_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ userdom_user_home_dir_filetrans($2, tvtime_home_t, dir, ".tvtime")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `tvtime_role'($*)) dnl
+ ')
+
+## On-line manual database.
+
+########################################
+##
+## Execute the mandb program in
+## the mandb domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mandb_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mandb_domtrans'($*)) dnl
+
+ gen_require(`
+ type mandb_t, mandb_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mandb_exec_t, mandb_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mandb_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mandb in the mandb
+## domain, and allow the specified
+## role the mandb domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`mandb_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mandb_run'($*)) dnl
+
+ gen_require(`
+ attribute_role mandb_roles;
+ ')
+
+ mandb_domtrans($1)
+ roleattribute $2 mandb_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mandb_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an mandb environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`mandb_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mandb_admin'($*)) dnl
+
+ gen_require(`
+ type mandb_t;
+ ')
+
+ admin_process_pattern($1, mandb_t)
+
+ mandb_run($1, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mandb_admin'($*)) dnl
+ ')
+
+## Squid log analysis.
+
+########################################
+##
+## Execute the calamaris in
+## the calamaris domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`calamaris_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `calamaris_domtrans'($*)) dnl
+
+ gen_require(`
+ type calamaris_t, calamaris_exec_t;
+ ')
+
+ files_search_etc($1)
+ domtrans_pattern($1, calamaris_exec_t, calamaris_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `calamaris_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute calamaris in the
+## calamaris domain, and allow the
+## specified role the calamaris domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`calamaris_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `calamaris_run'($*)) dnl
+
+ gen_require(`
+ attribute_role calamaris_roles;
+ ')
+
+ lightsquid_domtrans($1)
+ roleattribute $2 calamaris_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `calamaris_run'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read calamaris www files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`calamaris_read_www_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `calamaris_read_www_files'($*)) dnl
+
+ gen_require(`
+ type calamaris_www_t;
+ ')
+
+ allow $1 calamaris_www_t:dir list_dir_perms;
+ read_files_pattern($1, calamaris_www_t, calamaris_www_t)
+ read_lnk_files_pattern($1, calamaris_www_t, calamaris_www_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `calamaris_read_www_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an calamaris environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`calamaris_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `calamaris_admin'($*)) dnl
+
+ gen_require(`
+ type calamaris_t, calamaris_log_t, calamaris_www_t;
+ ')
+
+ allow $1 calamaris_t:process { ptrace signal_perms };
+ ps_process_pattern($1, calamaris_t)
+
+ calamaris_run($1, $2)
+
+ logging_list_logs($1)
+ admin_pattern($1, calamaris_log_t)
+
+ apache_list_sys_content($1)
+ admin_pattern($1, calamaris_www_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `calamaris_admin'($*)) dnl
+ ')
+
+## Java virtual machine
+
+########################################
+##
+## Role access for java.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`java_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_role'($*)) dnl
+
+ gen_require(`
+ attribute_role java_roles;
+ type java_t, java_exec_t, java_tmp_t;
+ type java_tmpfs_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 java_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, java_exec_t, java_t)
+
+ allow $2 java_t:process { noatsecure siginh rlimitinh ptrace signal_perms };
+ ps_process_pattern($2, java_t)
+
+ allow $2 java_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { java_tmp_t java_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 java_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 java_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 java_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow java_t $2:process signull;
+ allow java_t $2:unix_stream_socket connectto;
+ allow java_t $2:unix_stream_socket { read write };
+ allow java_t $2:tcp_socket { read write };
+
+ ifdef(`distro_gentoo',`
+ gen_require(`
+ type java_home_t;
+ ')
+
+ manage_files_pattern($2, java_home_t, java_home_t)
+ manage_dirs_pattern($2, java_home_t, java_home_t)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_role'($*)) dnl
+ ')
+
+
+#######################################
+##
+## The role template for the java module.
+##
+##
+##
+## This template creates a derived domains which are used
+## for java applications.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`java_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_role_template'($*)) dnl
+
+ gen_require(`
+ attribute java_domain;
+ type java_exec_t, java_tmp_t, java_tmpfs_t;
+ type java_home_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type $1_java_t, java_domain;
+ userdom_user_application_domain($1_java_t, java_exec_t)
+
+ role $2 types $1_java_t;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($3, java_exec_t, $1_java_t)
+
+ allow $3 $1_java_t:process { ptrace noatsecure siginh rlimitinh signal_perms };
+ ps_process_pattern($3, $1_java_t)
+
+ allow $3 { java_home_t java_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 { java_tmp_t java_tmpfs_t java_home_t }:file { manage_file_perms relabel_file_perms };
+ allow $3 java_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $3 java_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $3 java_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ userdom_user_home_dir_filetrans($3, java_home_t, dir, ".java")
+
+ allow $1_java_t $3:process signull;
+ allow $1_java_t $3:unix_stream_socket connectto;
+ allow $1_java_t $3:unix_stream_socket { read write };
+ allow $1_java_t $3:tcp_socket { read write };
+
+ corecmd_bin_domtrans($1_java_t, $3)
+
+ auth_use_nsswitch($1_java_t)
+
+ optional_policy(`
+ xserver_role($2, $1_java_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the java program in the java domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`java_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_domtrans'($*)) dnl
+
+ gen_require(`
+ type java_t, java_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, java_exec_t, java_t)
+
+ ifdef(`distro_gentoo',`
+ # /usr/bin/java is a symlink
+ files_read_usr_symlinks($1)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute java in the java domain, and
+## allow the specified role the java domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`java_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_run'($*)) dnl
+
+ gen_require(`
+ attribute_role java_roles;
+ ')
+
+ java_domtrans($1)
+ roleattribute $2 java_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the java program in the
+## unconfined java domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`java_domtrans_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_domtrans_unconfined'($*)) dnl
+
+ gen_require(`
+ type unconfined_java_t, java_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, java_exec_t, unconfined_java_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_domtrans_unconfined'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the java program in the
+## unconfined java domain and allow the
+## specified role the java domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`java_run_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_run_unconfined'($*)) dnl
+
+ gen_require(`
+ attribute_role unconfined_java_roles;
+ ')
+
+ java_domtrans_unconfined($1)
+ roleattribute $2 unconfined_java_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_run_unconfined'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the java program in
+## the callers domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`java_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_exec'($*)) dnl
+
+ gen_require(`
+ type java_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, java_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## generic java home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`java_manage_generic_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_manage_generic_home_content'($*)) dnl
+
+ gen_require(`
+ type java_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 java_home_t:dir manage_dir_perms;
+ allow $1 java_home_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_manage_generic_home_content'($*)) dnl
+ ')
+
+
+######################################
+##
+## Create, read, write, and delete
+## temporary java content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`java_manage_java_tmp',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_manage_java_tmp'($*)) dnl
+
+ gen_require(`
+ type java_tmp_t;
+ ')
+
+ allow $1 java_tmp_t:dir manage_dir_perms;
+ allow $1 java_tmp_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_manage_java_tmp'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create specified objects in user home
+## directories with the generic java
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`java_home_filetrans_java_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_home_filetrans_java_home'($*)) dnl
+
+ gen_require(`
+ type java_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, java_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_home_filetrans_java_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run java in javaplugin domain and
+## do not clean the environment (atsecure)
+##
+##
+##
+## This is needed when java is called by an application with library
+## settings (such as is the case when invoked as a browser plugin)
+##
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`java_noatsecure_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_noatsecure_domtrans'($*)) dnl
+
+ gen_require(`
+ type java_t;
+ ')
+
+ allow $1 java_t:process noatsecure;
+
+ java_domtrans($1)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_noatsecure_domtrans'($*)) dnl
+ ')
+
+
+# everything after here is gentoo-specific. ifdef's are not allowed for this unfortunately
+
+#######################################
+##
+## The template for using java in a domain.
+##
+##
+##
+## This template creates a derived domains which are used
+## for java applications.
+##
+##
+##
+##
+## The type of the domain to be given java privs.
+##
+##
+#
+ define(`java_domain_type',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `java_domain_type'($*)) dnl
+
+ gen_require(`
+ attribute java_domain;
+ ')
+
+ ########################################
+ #
+ # Policy
+ #
+
+ typeattribute $1 java_domain;
+
+ # cannot be called on the attribute, so do it now
+ auth_use_nsswitch($1)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `java_domain_type'($*)) dnl
+ ')
+
+## Command-line CPU frequency settings.
+
+########################################
+##
+## Send and receive messages from
+## cpufreq-selector over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`cpufreqselector_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cpufreqselector_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type cpufreqselector_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 cpufreqselector_t:dbus send_msg;
+ allow cpufreqselector_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cpufreqselector_dbus_chat'($*)) dnl
+ ')
+
+## Run Windows programs in Linux.
+
+########################################
+##
+## Role access for wine.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`wine_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wine_role'($*)) dnl
+
+ gen_require(`
+ attribute_role wine_roles;
+ type wine_exec_t, wine_t, wine_tmp_t;
+ type wine_home_t;
+ ')
+
+ roleattribute $1 wine_roles;
+
+ domtrans_pattern($2, wine_exec_t, wine_t)
+
+ allow wine_t $2:unix_stream_socket connectto;
+ allow wine_t $2:process signull;
+
+ ps_process_pattern($2, wine_t)
+ allow $2 wine_t:process { ptrace signal_perms };
+
+ allow $2 wine_t:fd use;
+ allow $2 wine_t:shm { associate getattr };
+ allow $2 wine_t:shm rw_shm_perms;
+ allow $2 wine_t:unix_stream_socket connectto;
+
+ allow $2 { wine_tmp_t wine_home_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { wine_tmp_t wine_home_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 wine_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, wine_home_t, dir, ".wine")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wine_role'($*)) dnl
+ ')
+
+
+#######################################
+##
+## The role template for the wine module.
+##
+##
+##
+## This template creates a derived domains which are used
+## for wine applications.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`wine_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wine_role_template'($*)) dnl
+
+ gen_require(`
+ type wine_exec_t;
+ ')
+
+ type $1_wine_t;
+ userdom_user_application_domain($1_wine_t, wine_exec_t)
+ role $2 types $1_wine_t;
+
+ allow $1_wine_t self:process { execmem execstack };
+
+ allow $3 $1_wine_t:process { ptrace noatsecure signal_perms };
+ ps_process_pattern($3, $1_wine_t)
+
+ domtrans_pattern($3, wine_exec_t, $1_wine_t)
+
+ corecmd_bin_domtrans($1_wine_t, $3)
+
+ userdom_manage_user_tmpfs_files($1_wine_t)
+
+ domain_mmap_low($1_wine_t)
+
+ tunable_policy(`wine_mmap_zero_ignore',`
+ dontaudit $1_wine_t self:memprotect mmap_zero;
+ ')
+
+ optional_policy(`
+ xserver_role($1_r, $1_wine_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wine_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the wine program in the wine domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`wine_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wine_domtrans'($*)) dnl
+
+ gen_require(`
+ type wine_t, wine_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, wine_exec_t, wine_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wine_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute wine in the wine domain,
+## and allow the specified role
+## the wine domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`wine_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wine_run'($*)) dnl
+
+ gen_require(`
+ attribute_role wine_roles;
+ ')
+
+ wine_domtrans($1)
+ roleattribute $2 wine_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wine_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write wine Shared
+## memory segments.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`wine_rw_shm',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wine_rw_shm'($*)) dnl
+
+ gen_require(`
+ type wine_t;
+ ')
+
+ allow $1 wine_t:shm rw_shm_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wine_rw_shm'($*)) dnl
+ ')
+
+## system-config-samba dbus service.
+## Log analyzer for squid proxy.
+
+########################################
+##
+## Execute the lightsquid program in
+## the lightsquid domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`lightsquid_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `lightsquid_domtrans'($*)) dnl
+
+ gen_require(`
+ type lightsquid_t, lightsquid_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, lightsquid_exec_t, lightsquid_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `lightsquid_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute lightsquid in the
+## lightsquid domain, and allow the
+## specified role the lightsquid domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`lightsquid_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `lightsquid_run'($*)) dnl
+
+ gen_require(`
+ attribute_role lightsquid_roles;
+ ')
+
+ lightsquid_domtrans($1)
+ roleattribute $2 lightsquid_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `lightsquid_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate an lightsquid environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`lightsquid_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `lightsquid_admin'($*)) dnl
+
+ gen_require(`
+ type lightsquid_t, lightsquid_rw_content_t;
+ ')
+
+ allow $1 lightsquid_t:process { ptrace signal_perms };
+ ps_process_pattern($1, lightsquid_t)
+
+ lightsquid_run($1, $2)
+
+ files_search_var_lib($1)
+ admin_pattern($1, lightsquid_rw_content_t)
+
+ apache_list_sys_content($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `lightsquid_admin'($*)) dnl
+ ')
+
+## IRC client policy.
+
+########################################
+##
+## Role access for IRC.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`irc_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `irc_role'($*)) dnl
+
+ gen_require(`
+ attribute_role irc_roles;
+ type irc_t, irc_exec_t, irc_home_t;
+ type irc_tmp_t, irc_log_home_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 irc_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, irc_exec_t, irc_t)
+
+ ps_process_pattern($2, irc_t)
+ allow $2 irc_t:process { ptrace signal_perms };
+
+ allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { irc_home_t irc_log_home_t irc_tmp_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, irc_home_t, dir, ".irssi")
+ userdom_user_home_dir_filetrans($2, irc_home_t, file, ".ircmotd")
+ userdom_user_home_dir_filetrans($2, irc_log_home_t, dir, "irclogs")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `irc_role'($*)) dnl
+ ')
+
+## VMWare Workstation virtual machines.
+
+########################################
+##
+## Role access for vmware.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`vmware_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vmware_role'($*)) dnl
+
+ gen_require(`
+ type vmware_t, vmware_exec_t, vmware_file_t;
+ type vmware_conf_t, vmware_tmp_t, vmware_tmpfs_t;
+ ')
+
+ role $1 types vmware_t;
+
+ domtrans_pattern($2, vmware_exec_t, vmware_t)
+
+ ps_process_pattern($2, vmware_t)
+ allow $2 vmware_t:process { ptrace signal_perms };
+
+ allow $2 { vmware_tmp_t vmware_file_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { vmware_conf_t vmware_file_t vmware_tmp_t vmware_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { vmware_tmp_t vmware_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ allow $2 vmware_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 vmware_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ userdom_user_home_dir_filetrans($2, vmware_file_t, dir, ".vmware")
+ userdom_user_home_dir_filetrans($2, vmware_file_t, dir, "vmware")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vmware_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute vmware host executables
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vmware_exec_host',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vmware_exec_host'($*)) dnl
+
+ gen_require(`
+ type vmware_host_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, vmware_host_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vmware_exec_host'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read vmware system configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vmware_read_system_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vmware_read_system_config'($*)) dnl
+
+ gen_require(`
+ type vmware_sys_conf_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 vmware_sys_conf_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vmware_read_system_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Append vmware system configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vmware_append_system_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vmware_append_system_config'($*)) dnl
+
+ gen_require(`
+ type vmware_sys_conf_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 vmware_sys_conf_t:file append_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vmware_append_system_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Append vmware log files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`vmware_append_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vmware_append_log'($*)) dnl
+
+ gen_require(`
+ type vmware_log_t;
+ ')
+
+ logging_search_logs($1)
+ append_files_pattern($1, vmware_log_t, vmware_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vmware_append_log'($*)) dnl
+ ')
+
+## Modular screen saver and locker for X11.
+
+########################################
+##
+## Role access for xscreensaver.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`xscreensaver_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `xscreensaver_role'($*)) dnl
+
+ gen_require(`
+ attribute_role xscreensaver_roles;
+ attribute_role xscreensaver_helper_roles;
+ type xscreensaver_t, xscreensaver_exec_t;
+ type xscreensaver_helper_t;
+ type xscreensaver_config_t, xscreensaver_tmpfs_t;
+ ')
+
+ roleattribute $1 xscreensaver_roles;
+ roleattribute $1 xscreensaver_helper_roles;
+
+ domtrans_pattern($2, xscreensaver_exec_t, xscreensaver_t)
+
+ allow $2 xscreensaver_t:process { ptrace signal_perms };
+ ps_process_pattern($2, xscreensaver_t)
+
+ allow $2 xscreensaver_config_t:file { manage_file_perms relabel_file_perms };
+
+ allow $2 xscreensaver_tmpfs_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 xscreensaver_tmpfs_t:file { manage_file_perms relabel_file_perms };
+
+ allow xscreensaver_helper_t $2:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `xscreensaver_role'($*)) dnl
+ ')
+
+## system-config-firewall dbus system service.
+
+########################################
+##
+## Send and receive messages from
+## firewallgui over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`firewallgui_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firewallgui_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type firewallgui_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 firewallgui_t:dbus send_msg;
+ allow firewallgui_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firewallgui_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read and
+## write firewallgui unnamed pipes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`firewallgui_dontaudit_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `firewallgui_dontaudit_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type firewallgui_t;
+ ')
+
+ dontaudit $1 firewallgui_t:fifo_file rw_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `firewallgui_dontaudit_rw_pipes'($*)) dnl
+ ')
+
+## Restricted (scp/sftp) only shell.
+
+########################################
+##
+## Role access for rssh.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`rssh_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rssh_role'($*)) dnl
+
+ gen_require(`
+ attribute_role rssh_roles;
+ type rssh_t, rssh_exec_t, rssh_ro_t;
+ type rssh_rw_t;
+ ')
+
+ roleattribute $1 rssh_roles;
+
+ domtrans_pattern($2, rssh_exec_t, rssh_t)
+
+ allow $2 rssh_t:process { ptrace signal_perms };
+ ps_process_pattern($2, rssh_t)
+
+ allow $2 { rssh_ro_t rssh_rw_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { rssh_ro_t rssh_rw_t }:file { manage_file_perms relabel_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rssh_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute rssh in the rssh domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rssh_spec_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rssh_spec_domtrans'($*)) dnl
+
+ gen_require(`
+ type rssh_t, rssh_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ spec_domtrans_pattern($1, rssh_exec_t, rssh_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rssh_spec_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the rssh program
+## in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rssh_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rssh_exec'($*)) dnl
+
+ gen_require(`
+ type rssh_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, rssh_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rssh_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to
+## run rssh chroot helper.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`rssh_domtrans_chroot_helper',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rssh_domtrans_chroot_helper'($*)) dnl
+
+ gen_require(`
+ type rssh_chroot_helper_t, rssh_chroot_helper_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, rssh_chroot_helper_exec_t, rssh_chroot_helper_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rssh_domtrans_chroot_helper'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read users rssh read-only content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`rssh_read_ro_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rssh_read_ro_content'($*)) dnl
+
+ gen_require(`
+ type rssh_ro_t;
+ ')
+
+ allow $1 rssh_ro_t:dir list_dir_perms;
+ allow $1 rssh_ro_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rssh_read_ro_content'($*)) dnl
+ ')
+
+## Podsleuth is a tool to get information about an Apple (TM) iPod (TM).
+
+########################################
+##
+## Execute a domain transition to run podsleuth.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`podsleuth_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `podsleuth_domtrans'($*)) dnl
+
+ gen_require(`
+ type podsleuth_t, podsleuth_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, podsleuth_exec_t, podsleuth_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `podsleuth_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute podsleuth in the podsleuth
+## domain, and allow the specified role
+## the podsleuth domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`podsleuth_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `podsleuth_run'($*)) dnl
+
+ gen_require(`
+ attribute_role podsleuth_roles;
+ ')
+
+ podsleuth_domtrans($1)
+ roleattribute $2 podsleuth_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `podsleuth_run'($*)) dnl
+ ')
+
+## GNU network object model environment.
+
+#######################################
+##
+## The role template for gnome.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`gnome_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_role_template'($*)) dnl
+
+ gen_require(`
+ attribute gnomedomain, gkeyringd_domain;
+ attribute_role gconfd_roles;
+ type gkeyringd_exec_t, gnome_keyring_home_t, gnome_keyring_tmp_t;
+ type gconfd_t, gconfd_exec_t, gconf_tmp_t;
+ type gconf_home_t, gnome_home_t;
+ ')
+
+ ########################################
+ #
+ # Gconf declarations
+ #
+
+ roleattribute $2 gconfd_roles;
+
+ ########################################
+ #
+ # Gkeyringd declarations
+ #
+
+ type $1_gkeyringd_t, gnomedomain, gkeyringd_domain;
+ userdom_user_application_domain($1_gkeyringd_t, gkeyringd_exec_t)
+ domain_user_exemption_target($1_gkeyringd_t)
+
+ role $2 types $1_gkeyringd_t;
+
+ ########################################
+ #
+ # Gconf policy
+ #
+
+ domtrans_pattern($3, gconfd_exec_t, gconfd_t)
+
+ allow $3 { gconf_home_t gconf_tmp_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 { gconf_home_t gconf_tmp_t }:file { manage_file_perms relabel_file_perms };
+ userdom_user_home_dir_filetrans($3, gconf_home_t, dir, ".gconf")
+ userdom_user_home_dir_filetrans($3, gconf_home_t, dir, ".gconfd")
+
+ allow $3 gconfd_t:process { ptrace signal_perms };
+ ps_process_pattern($3, gconfd_t)
+
+ ########################################
+ #
+ # Gkeyringd policy
+ #
+
+ domtrans_pattern($3, gkeyringd_exec_t, $1_gkeyringd_t)
+
+ allow $3 { gnome_home_t gnome_keyring_home_t gnome_keyring_tmp_t }:dir { relabel_dir_perms manage_dir_perms };
+ allow $3 { gnome_home_t gnome_keyring_home_t }:file { relabel_file_perms manage_file_perms };
+
+ userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome")
+ userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2")
+ userdom_user_home_dir_filetrans($3, gnome_home_t, dir, ".gnome2_private")
+
+ gnome_home_filetrans($3, gnome_keyring_home_t, dir, "keyrings")
+
+ allow $3 gnome_keyring_tmp_t:sock_file { relabel_sock_file_perms manage_sock_file_perms };
+
+ ps_process_pattern($3, $1_gkeyringd_t)
+ allow $3 $1_gkeyringd_t:process { ptrace signal_perms };
+
+ corecmd_bin_domtrans($1_gkeyringd_t, $3)
+ corecmd_shell_domtrans($1_gkeyringd_t, $3)
+
+ gnome_stream_connect_gkeyringd($1, $3)
+
+ optional_policy(`
+ dbus_spec_session_domain($1, $1_gkeyringd_t, gkeyringd_exec_t)
+ dbus_system_bus_client($1_gkeyringd_t)
+
+ optional_policy(`
+ evolution_dbus_chat($1_gkeyringd_t)
+ ')
+
+ optional_policy(`
+ gnome_dbus_chat_gconfd($3)
+ gnome_dbus_chat_gkeyringd($1, $3)
+ ')
+
+ optional_policy(`
+ wm_dbus_chat($1, $1_gkeyringd_t)
+ ')
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute gconf in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_exec_gconf',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_exec_gconf'($*)) dnl
+
+ gen_require(`
+ type gconfd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, gconfd_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_exec_gconf'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read gconf configuration content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_read_gconf_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_read_gconf_config'($*)) dnl
+
+ gen_require(`
+ type gconf_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 gconf_etc_t:dir list_dir_perms;
+ allow $1 gconf_etc_t:file read_file_perms;
+ allow $1 gconf_etc_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_read_gconf_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read
+## inherited gconf configuration files.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`gnome_dontaudit_read_inherited_gconf_config_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_dontaudit_read_inherited_gconf_config_files'($*)) dnl
+
+ gen_require(`
+ type gconf_etc_t;
+ ')
+
+ dontaudit $1 gconf_etc_t:file read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_dontaudit_read_inherited_gconf_config_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Create, read, write, and delete
+## gconf configuration content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_manage_gconf_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_manage_gconf_config'($*)) dnl
+
+ gen_require(`
+ type gconf_etc_t;
+ ')
+
+ files_search_etc($1)
+ allow $1 gconf_etc_t:dir manage_dir_perms;
+ allow $1 gconf_etc_t:file manage_file_perms;
+ allow $1 gconf_etc_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_manage_gconf_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to gconf using a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_stream_connect_gconf',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_gconf'($*)) dnl
+
+ gen_require(`
+ type gconfd_t, gconf_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, gconf_tmp_t, gconf_tmp_t, gconfd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_stream_connect_gconf'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run gconfd in gconfd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`gnome_domtrans_gconfd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_domtrans_gconfd'($*)) dnl
+
+ gen_require(`
+ type gconfd_t, gconfd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, gconfd_exec_t, gconfd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_domtrans_gconfd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create generic gnome home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_create_generic_home_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_create_generic_home_dirs'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ allow $1 gnome_home_t:dir create_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_create_generic_home_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set attributes of generic gnome
+## user home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_setattr_generic_home_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_setattr_generic_home_dirs'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ setattr_dirs_pattern($1, gnome_home_t, gnome_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_setattr_generic_home_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read generic gnome home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_read_generic_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_read_generic_home_content'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gnome_home_t:dir list_dir_perms;
+ allow $1 gnome_home_t:file { read_file_perms map };
+ allow $1 gnome_home_t:fifo_file read_fifo_file_perms;
+ allow $1 gnome_home_t:lnk_file read_lnk_file_perms;
+ allow $1 gnome_home_t:sock_file read_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_read_generic_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## generic gnome home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_manage_generic_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_manage_generic_home_content'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gnome_home_t:dir manage_dir_perms;
+ allow $1 gnome_home_t:file manage_file_perms;
+ allow $1 gnome_home_t:fifo_file manage_fifo_file_perms;
+ allow $1 gnome_home_t:lnk_file manage_lnk_file_perms;
+ allow $1 gnome_home_t:sock_file manage_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_manage_generic_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search generic gnome home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_search_generic_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_search_generic_home'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gnome_home_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_search_generic_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in gnome user home
+## directories with a private type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Private file type.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_home_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ filetrans_pattern($1, gnome_home_t, $2, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_home_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create generic gconf home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_create_generic_gconf_home_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_create_generic_gconf_home_dirs'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ allow $1 gconf_home_t:dir create_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_create_generic_gconf_home_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read generic gconf home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_read_generic_gconf_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_read_generic_gconf_home_content'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gconf_home_t:dir list_dir_perms;
+ allow $1 gconf_home_t:file read_file_perms;
+ allow $1 gconf_home_t:fifo_file read_fifo_file_perms;
+ allow $1 gconf_home_t:lnk_file read_lnk_file_perms;
+ allow $1 gconf_home_t:sock_file read_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_read_generic_gconf_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## generic gconf home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_manage_generic_gconf_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_manage_generic_gconf_home_content'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gconf_home_t:dir manage_dir_perms;
+ allow $1 gconf_home_t:file manage_file_perms;
+ allow $1 gconf_home_t:fifo_file manage_fifo_file_perms;
+ allow $1 gconf_home_t:lnk_file manage_lnk_file_perms;
+ allow $1 gconf_home_t:sock_file manage_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_manage_generic_gconf_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search generic gconf home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_search_generic_gconf_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_search_generic_gconf_home'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 gconf_home_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_search_generic_gconf_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the generic gconf
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_home_filetrans_gconf_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans_gconf_home'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, gconf_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_home_filetrans_gconf_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the generic gnome
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_home_filetrans_gnome_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_home_filetrans_gnome_home'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, gnome_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_home_filetrans_gnome_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in gnome gconf home
+## directories with a private type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Private file type.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_gconf_home_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_gconf_home_filetrans'($*)) dnl
+
+ gen_require(`
+ type gconf_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ filetrans_pattern($1, gconf_home_t, $2, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_gconf_home_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the gstreamer
+## orcexec type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_user_home_dir_filetrans_gstreamer_orcexec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_user_home_dir_filetrans_gstreamer_orcexec'($*)) dnl
+
+ gen_require(`
+ type gstreamer_orcexec_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, gstreamer_orcexec_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_user_home_dir_filetrans_gstreamer_orcexec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in the user
+## runtime directories with the
+## gstreamer orcexec type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`gnome_user_runtime_filetrans_gstreamer_orcexec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_user_runtime_filetrans_gstreamer_orcexec'($*)) dnl
+
+ gen_require(`
+ type gstreamer_orcexec_t;
+ ')
+
+ userdom_user_runtime_filetrans($1, gstreamer_orcexec_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_user_runtime_filetrans_gstreamer_orcexec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read generic gnome keyring home files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_read_keyring_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_read_keyring_home_files'($*)) dnl
+
+ gen_require(`
+ type gnome_home_t, gnome_keyring_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ read_files_pattern($1, { gnome_home_t gnome_keyring_home_t }, gnome_keyring_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_read_keyring_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## gnome configuration daemon over
+## dbus.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_dbus_chat_gconfd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_gconfd'($*)) dnl
+
+ gen_require(`
+ type gconfd_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 gconfd_t:dbus send_msg;
+ allow gconfd_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_gconfd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## gnome keyring daemon over dbus.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_dbus_chat_gkeyringd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_gkeyringd'($*)) dnl
+
+ gen_require(`
+ type $1_gkeyringd_t;
+ class dbus send_msg;
+ ')
+
+ allow $2 $1_gkeyringd_t:dbus send_msg;
+ allow $1_gkeyringd_t $2:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_gkeyringd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from all
+## gnome keyring daemon over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_dbus_chat_all_gkeyringd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_dbus_chat_all_gkeyringd'($*)) dnl
+
+ gen_require(`
+ attribute gkeyringd_domain;
+ class dbus send_msg;
+ ')
+
+ allow $1 gkeyringd_domain:dbus send_msg;
+ allow gkeyringd_domain $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_dbus_chat_all_gkeyringd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run all gkeyringd in gkeyringd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`gnome_spec_domtrans_all_gkeyringd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_spec_domtrans_all_gkeyringd'($*)) dnl
+
+ gen_require(`
+ attribute gkeyringd_domain;
+ type gkeyringd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ spec_domtrans_pattern($1, gkeyringd_exec_t, gkeyringd_domain)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_spec_domtrans_all_gkeyringd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to gnome keyring daemon
+## with a unix stream socket.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_stream_connect_gkeyringd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_gkeyringd'($*)) dnl
+
+ gen_require(`
+ type $1_gkeyringd_t, gnome_keyring_tmp_t;
+ ')
+
+ files_search_tmp($2)
+ userdom_search_user_runtime($2)
+ stream_connect_pattern($2, gnome_keyring_tmp_t, gnome_keyring_tmp_t, $1_gkeyringd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_stream_connect_gkeyringd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to all gnome keyring daemon
+## with a unix stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_stream_connect_all_gkeyringd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_stream_connect_all_gkeyringd'($*)) dnl
+
+ gen_require(`
+ attribute gkeyringd_domain;
+ type gnome_keyring_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ userdom_search_user_runtime($1)
+ stream_connect_pattern($1, gnome_keyring_tmp_t, gnome_keyring_tmp_t, gkeyringd_domain)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_stream_connect_all_gkeyringd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage gstreamer ORC optimized
+## code.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_manage_gstreamer_orcexec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_manage_gstreamer_orcexec'($*)) dnl
+
+ gen_require(`
+ type gstreamer_orcexec_t;
+ ')
+
+ allow $1 gstreamer_orcexec_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_manage_gstreamer_orcexec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mmap gstreamer ORC optimized
+## code.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gnome_mmap_gstreamer_orcexec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gnome_mmap_gstreamer_orcexec'($*)) dnl
+
+ gen_require(`
+ type gstreamer_orcexec_t;
+ ')
+
+ allow $1 gstreamer_orcexec_t:file mmap_exec_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gnome_mmap_gstreamer_orcexec'($*)) dnl
+ ')
+
+## Application that lets you synchronize your files across multiple devices.
+
+########################################
+##
+## Role access for Syncthing
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`syncthing_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `syncthing_role'($*)) dnl
+
+ gen_require(`
+ attribute_role syncthing_roles;
+ type syncthing_t, syncthing_exec_t, syncthing_xdg_config_t;
+ ')
+
+ roleattribute $1 syncthing_roles;
+
+ domtrans_pattern($2, syncthing_exec_t, syncthing_t)
+
+ allow $2 syncthing_xdg_config_t:file { manage_file_perms relabel_file_perms };
+ allow $2 syncthing_xdg_config_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 syncthing_xdg_config_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `syncthing_role'($*)) dnl
+ ')
+
+## CryFS and similar other tools which mount encrypted directories using FUSE.
+
+########################################
+##
+## Role access for CryFS.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`cryfs_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cryfs_role'($*)) dnl
+
+ gen_require(`
+ attribute_role cryfs_roles;
+ type cryfs_t, cryfs_exec_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 cryfs_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, cryfs_exec_t, cryfs_t)
+
+ allow $2 cryfs_t:process signal_perms;
+ ps_process_pattern($2, cryfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cryfs_role'($*)) dnl
+ ')
+
+## A wrapper that helps users run system programs.
+
+#######################################
+##
+## The role template for the userhelper module.
+##
+##
+##
+## The prefix of the user role (e.g., user
+## is the prefix for user_r).
+##
+##
+##
+##
+## The user role.
+##
+##
+##
+##
+## The user domain associated with the role.
+##
+##
+#
+ define(`userhelper_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_role_template'($*)) dnl
+
+ gen_require(`
+ attribute userhelper_type, consolehelper_type;
+ attribute_role userhelper_roles, consolehelper_roles;
+ type userhelper_exec_t, consolehelper_exec_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type $1_consolehelper_t, consolehelper_type;
+ userdom_user_application_domain($1_consolehelper_t, consolehelper_exec_t)
+
+ role consolehelper_roles types $1_consolehelper_t;
+ roleattribute $2 consolehelper_roles;
+
+ type $1_userhelper_t, userhelper_type;
+ userdom_user_application_domain($1_userhelper_t, userhelper_exec_t)
+
+ domain_role_change_exemption($1_userhelper_t)
+ domain_obj_id_change_exemption($1_userhelper_t)
+ domain_interactive_fd($1_userhelper_t)
+ domain_subj_id_change_exemption($1_userhelper_t)
+
+ role userhelper_roles types $1_userhelper_t;
+ roleattribute $2 userhelper_roles;
+
+ ########################################
+ #
+ # Consolehelper local policy
+ #
+
+ allow $1_consolehelper_t $3:unix_stream_socket connectto;
+
+ domtrans_pattern($3, consolehelper_exec_t, $1_consolehelper_t)
+
+ allow $3 $1_consolehelper_t:process { ptrace signal_perms };
+ ps_process_pattern($3, $1_consolehelper_t)
+
+ auth_use_pam($1_consolehelper_t)
+
+ optional_policy(`
+ dbus_connect_all_session_bus($1_consolehelper_t)
+
+ optional_policy(`
+ userhelper_dbus_chat_all_consolehelper($3)
+ ')
+ ')
+
+ ########################################
+ #
+ # Userhelper local policy
+ #
+
+ domtrans_pattern($3, userhelper_exec_t, $1_userhelper_t)
+
+ dontaudit $3 $1_userhelper_t:process signal;
+
+ corecmd_bin_domtrans($1_userhelper_t, $3)
+
+ auth_domtrans_chk_passwd($1_userhelper_t)
+ auth_use_nsswitch($1_userhelper_t)
+
+ userdom_bin_spec_domtrans_unpriv_users($1_userhelper_t)
+ userdom_entry_spec_domtrans_unpriv_users($1_userhelper_t)
+
+ optional_policy(`
+ tunable_policy(`! secure_mode',`
+ sysadm_bin_spec_domtrans($1_userhelper_t)
+ sysadm_entry_spec_domtrans($1_userhelper_t)
+ ')
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search userhelper configuration directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_search_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_search_config'($*)) dnl
+
+ gen_require(`
+ type userhelper_conf_t;
+ ')
+
+ allow $1 userhelper_conf_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_search_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search
+## userhelper configuration directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`userhelper_dontaudit_search_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_dontaudit_search_config'($*)) dnl
+
+ gen_require(`
+ type userhelper_conf_t;
+ ')
+
+ dontaudit $1 userhelper_conf_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_dontaudit_search_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## consolehelper over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_dbus_chat_all_consolehelper',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_dbus_chat_all_consolehelper'($*)) dnl
+
+ gen_require(`
+ attribute consolehelper_type;
+ class dbus send_msg;
+ ')
+
+ allow $1 consolehelper_type:dbus send_msg;
+ allow consolehelper_type $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_dbus_chat_all_consolehelper'($*)) dnl
+ ')
+
+
+########################################
+##
+## Use userhelper all userhelper file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_use_fd',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_use_fd'($*)) dnl
+
+ gen_require(`
+ attribute userhelper_type;
+ ')
+
+ allow $1 userhelper_type:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_use_fd'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send child terminated signals to all userhelper.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_sigchld',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_sigchld'($*)) dnl
+
+ gen_require(`
+ attribute userhelper_type;
+ ')
+
+ allow $1 userhelper_type:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_sigchld'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the userhelper program in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_exec'($*)) dnl
+
+ gen_require(`
+ type userhelper_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, userhelper_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the consolehelper program
+## in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`userhelper_exec_consolehelper',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `userhelper_exec_consolehelper'($*)) dnl
+
+ gen_require(`
+ type consolehelper_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, consolehelper_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `userhelper_exec_consolehelper'($*)) dnl
+ ')
+
+## Record audio or data Compact Discs from a master.
+
+########################################
+##
+## Role access for cdrecord.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`cdrecord_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cdrecord_role'($*)) dnl
+
+ gen_require(`
+ attribute_role cdrecord_roles;
+ type cdrecord_t, cdrecord_exec_t;
+ ')
+
+ roleattribute $1 cdrecord_roles;
+
+ domtrans_pattern($2, cdrecord_exec_t, cdrecord_t)
+
+ allow cdrecord_t $2:unix_stream_socket rw_socket_perms;
+
+ allow $2 cdrecord_t:process { ptrace signal_perms };
+ ps_process_pattern($2, cdrecord_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cdrecord_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute cdrecord in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`cdrecord_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `cdrecord_exec'($*)) dnl
+
+ gen_require(`
+ type cdrecord_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, cdrecord_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `cdrecord_exec'($*)) dnl
+ ')
+
+## Load keyboard mappings.
+
+########################################
+##
+## Execute the loadkeys program in
+## the loadkeys domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`loadkeys_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `loadkeys_domtrans'($*)) dnl
+
+ gen_require(`
+ type loadkeys_t, loadkeys_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, loadkeys_exec_t, loadkeys_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `loadkeys_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the loadkeys program in
+## the loadkeys domain, and allow the
+## specified role the loadkeys domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`loadkeys_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `loadkeys_run'($*)) dnl
+
+ gen_require(`
+ attribute_role loadkeys_roles;
+ ')
+
+ loadkeys_domtrans($1)
+ roleattribute $2 loadkeys_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `loadkeys_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the loadkeys in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`loadkeys_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `loadkeys_exec'($*)) dnl
+
+ gen_require(`
+ type loadkeys_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, loadkeys_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `loadkeys_exec'($*)) dnl
+ ')
+
+## GNU terminal multiplexer.
+
+#######################################
+##
+## The role template for the screen module.
+##
+##
+##
+## The prefix of the user role (e.g., user
+## is the prefix for user_r).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`screen_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `screen_role_template'($*)) dnl
+
+ gen_require(`
+ attribute screen_domain;
+ attribute_role screen_roles;
+ type screen_exec_t, screen_tmp_t;
+ type screen_home_t, screen_runtime_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type $1_screen_t, screen_domain;
+ userdom_user_application_domain($1_screen_t, screen_exec_t)
+ domain_interactive_fd($1_screen_t)
+ role screen_roles types $1_screen_t;
+
+ roleattribute $2 screen_roles;
+
+ ########################################
+ #
+ # Local policy
+ #
+
+ dontaudit $1_screen_t self:capability sys_tty_config;
+
+ domtrans_pattern($3, screen_exec_t, $1_screen_t)
+
+ ps_process_pattern($3, $1_screen_t)
+ allow $3 $1_screen_t:process { ptrace signal_perms };
+
+ dontaudit $3 $1_screen_t:unix_stream_socket { read write };
+ allow $1_screen_t $3:process signal;
+
+ allow $3 screen_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 screen_tmp_t:file { manage_file_perms relabel_file_perms };
+ allow $3 screen_tmp_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+
+ allow $3 screen_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $3 screen_home_t:file { manage_file_perms relabel_file_perms };
+ allow $3 screen_home_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $3 screen_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+
+ userdom_user_home_dir_filetrans($3, screen_home_t, dir, ".screen")
+ userdom_user_home_dir_filetrans($3, screen_home_t, file, ".screenrc")
+ userdom_user_home_dir_filetrans($3, screen_home_t, file, ".tmux.conf")
+
+ manage_dirs_pattern($3, screen_runtime_t, screen_runtime_t)
+ manage_files_pattern($3, screen_runtime_t, screen_runtime_t)
+ manage_lnk_files_pattern($3, screen_runtime_t, screen_runtime_t)
+ manage_fifo_files_pattern($3, screen_runtime_t, screen_runtime_t)
+
+ corecmd_bin_domtrans($1_screen_t, $3)
+ corecmd_shell_domtrans($1_screen_t, $3)
+
+ auth_domtrans_chk_passwd($1_screen_t)
+ auth_use_nsswitch($1_screen_t)
+
+ userdom_user_home_domtrans($1_screen_t, $3)
+
+ tunable_policy(`use_samba_home_dirs',`
+ fs_cifs_domtrans($1_screen_t, $3)
+ ')
+
+ tunable_policy(`use_nfs_home_dirs',`
+ fs_nfs_domtrans($1_screen_t, $3)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `screen_role_template'($*)) dnl
+ ')
+
+## Peer to peer file sharing tool.
+
+########################################
+##
+## Role access for gift.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`gift_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gift_role'($*)) dnl
+
+ gen_require(`
+ attribute_role gift_roles, giftd_roles;
+ type gift_t, gift_exec_t, gift_home_t;
+ type giftd_t, giftd_exec_t, gift_tmpfs_t;
+ ')
+
+ roleattribute $1 gift_roles;
+ roleattribute $1 giftd_roles;
+
+ domtrans_pattern($2, gift_exec_t, gift_t)
+ domtrans_pattern($2, giftd_exec_t, giftd_t)
+
+ allow $2 gift_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { gift_home_t gift_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { gift_home_t gift_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 gift_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 gift_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ userdom_user_home_dir_filetrans($2, gift_home_t, dir, ".giFT")
+
+ ps_process_pattern($2, { gift_t giftd_t })
+ allow $2 { gift_t giftd_t }:process { ptrace signal_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gift_role'($*)) dnl
+ ')
+
+## Evolution email client.
+
+########################################
+##
+## Role access for evolution.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`evolution_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_role'($*)) dnl
+
+ gen_require(`
+ attribute_role evolution_roles;
+ type evolution_t, evolution_exec_t, evolution_home_t;
+ type evolution_alarm_t, evolution_alarm_exec_t, evolution_alarm_orbit_tmp_t;
+ type evolution_exchange_t, evolution_exchange_exec_t, evolution_exchange_tmp_t;
+ type evolution_exchange_orbit_tmp_t, evolution_orbit_tmp_t, evolution_server_orbit_tmp_t;
+ type evolution_server_t, evolution_server_exec_t, evolution_webcal_t;
+ type evolution_webcal_exec_t, evolution_alarm_tmpfs_t, evolution_exchange_tmpfs_t;
+ type evolution_tmpfs_t, evolution_webcal_tmpfs_t;
+ ')
+
+ roleattribute $1 evolution_roles;
+
+ domtrans_pattern($2, evolution_exec_t, evolution_t)
+ domtrans_pattern($2, evolution_alarm_exec_t, evolution_alarm_t)
+ domtrans_pattern($2, evolution_exchange_exec_t, evolution_exchange_t)
+ domtrans_pattern($2, evolution_server_exec_t, evolution_server_t)
+ domtrans_pattern($2, evolution_webcal_exec_t, evolution_webcal_t)
+
+ allow $2 { evolution_t evolution_alarm_t evolution_exchange_t evolution_server_t evolution_webcal_t }:process { noatsecure ptrace signal_perms };
+ ps_process_pattern($2, { evolution_t evolution_alarm_t evolution_exchange_t })
+ ps_process_pattern($2, { evolution_server_t evolution_webcal_t })
+
+ allow evolution_t $2:dir search_dir_perms;
+ allow evolution_t $2:file read_file_perms;
+ allow evolution_t $2:lnk_file read_lnk_file_perms;
+
+ allow $2 evolution_home_t:dir { relabel_dir_perms manage_dir_perms };
+ allow $2 evolution_home_t:file { relabel_file_perms manage_file_perms };
+ allow $2 evolution_home_t:lnk_file { relabel_lnk_file_perms manage_lnk_file_perms };
+
+ userdom_user_home_dir_filetrans($2, evolution_home_t, dir, ".camel_certs")
+ userdom_user_home_dir_filetrans($2, evolution_home_t, dir, ".evolution")
+
+ allow $2 evolution_exchange_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { evolution_alarm_orbit_tmp_t evolution_exchange_orbit_tmp_t evolution_orbit_tmp_t evolution_server_orbit_tmp_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ allow $2 { evolution_alarm_tmpfs_t evolution_exchange_tmpfs_t evolution_tmpfs_t evolution_webcal_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+
+ allow { evolution_t evolution_exchange_t } $2:unix_stream_socket connectto;
+
+ stream_connect_pattern($2, evolution_orbit_tmp_t, evolution_orbit_tmp_t, evolution_t)
+ stream_connect_pattern($2, evolution_exchange_orbit_tmp_t, evolution_exchange_orbit_tmp_t, evolution_exchange_t)
+
+ optional_policy(`
+ evolution_dbus_chat($2)
+ evolution_alarm_dbus_chat($2)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in the evolution home
+## directories with a private type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Private file type.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`evolution_home_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_home_filetrans'($*)) dnl
+
+ gen_require(`
+ type evolution_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ filetrans_pattern($1, evolution_home_t, $2, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_home_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read evolution home files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_read_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_read_home_files'($*)) dnl
+
+ gen_require(`
+ type evolution_home_t;
+ ')
+
+ read_files_pattern($1, evolution_home_t, evolution_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_read_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to evolution using a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_stream_connect'($*)) dnl
+
+ gen_require(`
+ type evolution_t, evolution_orbit_tmp_t;
+ ')
+
+
+ files_search_tmp($1)
+ stream_connect_pattern($1, evolution_orbit_tmp_t, evolution_orbit_tmp_t, evolution_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read evolution orbit temporary
+## files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_read_orbit_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_read_orbit_tmp_files'($*)) dnl
+
+ gen_require(`
+ type evolution_orbit_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ read_files_pattern($1, evolution_orbit_tmp_t, evolution_orbit_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_read_orbit_tmp_files'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send and receive messages from
+## evolution over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type evolution_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 evolution_t:dbus send_msg;
+ allow evolution_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## evolution_alarm over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_alarm_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_alarm_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type evolution_alarm_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 evolution_alarm_t:dbus send_msg;
+ allow evolution_alarm_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_alarm_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a domain transition to the
+## evolution target domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`evolution_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `evolution_domtrans'($*)) dnl
+
+ gen_require(`
+ type evolution_t, evolution_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, evolution_exec_t, evolution_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `evolution_domtrans'($*)) dnl
+ ')
+
+## Various games.
+
+########################################
+##
+## Role access for games.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`games_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `games_role'($*)) dnl
+
+ gen_require(`
+ attribute_role games_roles;
+ type games_t, games_exec_t, games_tmp_t;
+ type games_tmpfs_t;
+ ')
+
+ roleattribute $1 games_roles;
+
+ domtrans_pattern($2, games_exec_t, games_t)
+
+ allow $2 games_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { games_tmp_t games_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 games_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 games_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow $2 games_t:process { ptrace signal_perms };
+ ps_process_pattern($2, games_t)
+
+ stream_connect_pattern($2, games_tmpfs_t, games_tmpfs_t, games_t)
+
+ allow games_t $2:unix_stream_socket connectto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `games_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write games data files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`games_rw_data',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `games_rw_data'($*)) dnl
+
+ gen_require(`
+ type games_data_t;
+ ')
+
+ files_search_var_lib($1)
+ rw_files_pattern($1, games_data_t, games_data_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `games_rw_data'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run a game in the game domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`games_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `games_domtrans'($*)) dnl
+
+ gen_require(`
+ type games_t, games_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, games_exec_t, games_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `games_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## games over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`games_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `games_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type games_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 games_t:dbus send_msg;
+ allow games_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `games_dbus_chat'($*)) dnl
+ ')
+
+## GNAT Ada95 compiler.
+
+########################################
+##
+## Execute the ada program in the ada domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`ada_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ada_domtrans'($*)) dnl
+
+ gen_require(`
+ type ada_t, ada_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, ada_exec_t, ada_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ada_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ada in the ada domain, and
+## allow the specified role the ada domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`ada_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ada_run'($*)) dnl
+
+ gen_require(`
+ attribute_role ada_roles;
+ ')
+
+ ada_domtrans($1)
+ roleattribute $2 ada_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ada_run'($*)) dnl
+ ')
+
+## Web server log analysis.
+
+########################################
+##
+## Execute webalizer in the webalizer domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`webalizer_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `webalizer_domtrans'($*)) dnl
+
+ gen_require(`
+ type webalizer_t, webalizer_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, webalizer_exec_t, webalizer_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `webalizer_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute webalizer in the webalizer
+## domain, and allow the specified
+## role the webalizer domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`webalizer_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `webalizer_run'($*)) dnl
+
+ gen_require(`
+ attribute_role webalizer_roles;
+ ')
+
+ webalizer_domtrans($1)
+ roleattribute $2 webalizer_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `webalizer_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage webalizer usage files
+##
+##
+##
+## Domain allowed to manage webalizer usage files
+##
+##
+##
+#
+ define(`manage_webalizer_var_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `manage_webalizer_var_lib'($*)) dnl
+
+ gen_require(`
+ type webalizer_var_lib_t;
+ ')
+
+ allow $1 webalizer_var_lib_t:dir manage_dir_perms;
+ allow $1 webalizer_var_lib_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `manage_webalizer_var_lib'($*)) dnl
+ ')
+
+## Tool for building alternate livecd for different os and policy versions.
+
+########################################
+##
+## Execute a domain transition to run livecd.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`livecd_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `livecd_domtrans'($*)) dnl
+
+ gen_require(`
+ type livecd_t, livecd_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, livecd_exec_t, livecd_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `livecd_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute livecd in the livecd
+## domain, and allow the specified
+## role the livecd domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`livecd_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `livecd_run'($*)) dnl
+
+ gen_require(`
+ attribute_role livecd_roles;
+ ')
+
+ livecd_domtrans($1)
+ roleattribute $2 livecd_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `livecd_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read livecd temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`livecd_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `livecd_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type livecd_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ read_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `livecd_read_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write livecd temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`livecd_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `livecd_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type livecd_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ rw_files_pattern($1, livecd_tmp_t, livecd_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `livecd_rw_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write livecd semaphores.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`livecd_rw_semaphores',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `livecd_rw_semaphores'($*)) dnl
+
+ gen_require(`
+ type livecd_t;
+ ')
+
+ allow $1 livecd_t:sem rw_sem_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `livecd_rw_semaphores'($*)) dnl
+ ')
+
+## Log file analyzer for advanced statistics.
+
+########################################
+##
+## Execute the awstats program in
+## the awstats domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`awstats_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `awstats_domtrans'($*)) dnl
+
+ gen_require(`
+ type awstats_t, awstats_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, awstats_exec_t, awstats_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `awstats_domtrans'($*)) dnl
+ ')
+
+## Filesystem namespacing/polyinstantiation application.
+
+########################################
+##
+## Execute a domain transition to run seunshare.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`seunshare_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `seunshare_domtrans'($*)) dnl
+
+ gen_require(`
+ type seunshare_t, seunshare_exec_t;
+ ')
+
+ domtrans_pattern($1, seunshare_exec_t, seunshare_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `seunshare_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute seunshare in the seunshare domain, and
+## allow the specified role the seunshare domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`seunshare_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `seunshare_run'($*)) dnl
+
+ gen_require(`
+ type seunshare_t;
+ ')
+
+ seunshare_domtrans($1)
+ role $2 types seunshare_t;
+
+ allow $1 seunshare_t:process signal_perms;
+
+ ifdef(`hide_broken_symptoms', `
+ dontaudit seunshare_t $1:tcp_socket rw_socket_perms;
+ dontaudit seunshare_t $1:udp_socket rw_socket_perms;
+ dontaudit seunshare_t $1:unix_stream_socket rw_socket_perms;
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `seunshare_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Role access for seunshare
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`seunshare_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `seunshare_role'($*)) dnl
+
+ gen_require(`
+ type seunshare_t;
+ ')
+
+ role $2 types seunshare_t;
+
+ seunshare_domtrans($1)
+
+ ps_process_pattern($2, seunshare_t)
+ allow $2 seunshare_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `seunshare_role'($*)) dnl
+ ')
+
+## Run .NET server and client applications on Linux.
+
+#######################################
+##
+## The role template for the mono module.
+##
+##
+##
+## This template creates a derived domains which are used
+## for mono applications.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`mono_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mono_role_template'($*)) dnl
+
+ gen_require(`
+ attribute mono_domain;
+ type mono_exec_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type $1_mono_t, mono_domain;
+ domain_type($1_mono_t)
+ domain_entry_file($1_mono_t, mono_exec_t)
+ role $2 types $1_mono_t;
+
+ domain_interactive_fd($1_mono_t)
+ application_type($1_mono_t)
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($3, mono_exec_t, $1_mono_t)
+
+ allow $3 $1_mono_t:process { ptrace noatsecure signal_perms };
+ ps_process_pattern($2, $1_mono_t)
+
+ corecmd_bin_domtrans($1_mono_t, $3)
+
+ userdom_manage_user_tmpfs_files($1_mono_t)
+
+ optional_policy(`
+ fs_dontaudit_rw_tmpfs_files($1_mono_t)
+
+ xserver_role($1_r, $1_mono_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mono_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mono in the mono domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mono_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mono_domtrans'($*)) dnl
+
+ gen_require(`
+ type mono_t, mono_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mono_exec_t, mono_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mono_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mono in the mono domain, and
+## allow the specified role the mono domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`mono_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mono_run'($*)) dnl
+
+ gen_require(`
+ attribute_role mono_roles;
+ ')
+
+ mono_domtrans($1)
+ roleattribute $2 mono_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mono_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mono in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mono_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mono_exec'($*)) dnl
+
+ gen_require(`
+ type mono_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, mono_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mono_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write mono shared memory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mono_rw_shm',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mono_rw_shm'($*)) dnl
+
+ gen_require(`
+ type mono_t;
+ ')
+
+ allow $1 mono_t:shm rw_shm_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mono_rw_shm'($*)) dnl
+ ')
+
+## X Window Managers.
+
+#######################################
+##
+## The role template for the wm module.
+##
+##
+##
+## This template creates a derived domains which are used
+## for window manager applications.
+##
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`wm_role_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_role_template'($*)) dnl
+
+ gen_require(`
+ attribute wm_domain;
+ type wm_exec_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ type $1_wm_t, wm_domain;
+ userdom_user_application_domain($1_wm_t, wm_exec_t)
+ role $2 types $1_wm_t;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ allow $3 $1_wm_t:fd use;
+
+ allow $1_wm_t $3:unix_stream_socket connectto;
+ allow $3 $1_wm_t:unix_stream_socket connectto;
+
+ allow $3 $1_wm_t:process { ptrace signal_perms };
+ ps_process_pattern($3, $1_wm_t)
+
+ allow $1_wm_t $3:process { signull sigkill };
+
+ domtrans_pattern($3, wm_exec_t, $1_wm_t)
+
+ corecmd_bin_domtrans($1_wm_t, $3)
+ corecmd_shell_domtrans($1_wm_t, $3)
+
+ mls_file_read_all_levels($1_wm_t)
+ mls_file_write_all_levels($1_wm_t)
+ mls_xwin_read_all_levels($1_wm_t)
+ mls_xwin_write_all_levels($1_wm_t)
+ mls_fd_use_all_levels($1_wm_t)
+
+ auth_use_nsswitch($1_wm_t)
+
+ xserver_role($2, $1_wm_t)
+ xserver_manage_core_devices($1_wm_t)
+
+ wm_write_pipes($1, $3)
+
+ optional_policy(`
+ dbus_connect_spec_session_bus($1, $1_wm_t)
+ dbus_spec_session_bus_client($1, $1_wm_t)
+ dbus_system_bus_client($1_wm_t)
+
+ optional_policy(`
+ wm_dbus_chat($1, $3)
+ ')
+ ')
+
+ optional_policy(`
+ gnome_stream_connect_all_gkeyringd($1_wm_t)
+ ')
+
+ optional_policy(`
+ policykit_run_auth($1_wm_t, $2)
+ policykit_signal_auth($1_wm_t)
+ ')
+
+ optional_policy(`
+ pulseaudio_run($1_wm_t, $2)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_role_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute wm in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`wm_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_exec'($*)) dnl
+
+ gen_require(`
+ type wm_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, wm_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## specified wm over dbus.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`wm_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type $1_wm_t;
+ class dbus send_msg;
+ ')
+
+ allow $2 $1_wm_t:dbus send_msg;
+ allow $1_wm_t $2:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to execute
+## files in temporary directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`wm_dontaudit_exec_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_dontaudit_exec_tmp_files'($*)) dnl
+
+ gen_require(`
+ type wm_tmp_t;
+ ')
+
+ dontaudit $1 wm_tmp_t:file exec_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_dontaudit_exec_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to execute
+## files in temporary filesystems.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`wm_dontaudit_exec_tmpfs_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_dontaudit_exec_tmpfs_files'($*)) dnl
+
+ gen_require(`
+ type wm_tmpfs_t;
+ ')
+
+ dontaudit $1 wm_tmpfs_t:file exec_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_dontaudit_exec_tmpfs_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create a domain for applications
+## that are launched by the window
+## manager.
+##
+##
+##
+## Create a domain for applications that are launched by the
+## window manager (implying a domain transition). Typically
+## these are graphical applications that are run interactively.
+##
+##
+## The types will be made usable as a domain and file, making
+## calls to domain_type() and files_type() redundant.
+##
+##
+##
+##
+## Type to be used in the domain transition as the application
+## domain.
+##
+##
+##
+##
+## Type of the program to be used as an entry point to this domain.
+##
+##
+##
+##
+## Type to be used as the source window manager domain.
+##
+##
+##
+#
+ define(`wm_application_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_application_domain'($*)) dnl
+
+ gen_require(`
+ attribute wm_domain;
+ ')
+
+ userdom_user_application_domain($1, $2)
+ domtrans_pattern(wm_domain, $2, $1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_application_domain'($*)) dnl
+ ')
+
+
+########################################
+##
+## Write wm unnamed pipes.
+##
+##
+##
+## The prefix of the user domain (e.g., user
+## is the prefix for user_t).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`wm_write_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wm_write_pipes'($*)) dnl
+
+ gen_require(`
+ type $1_wm_t;
+ ')
+
+ allow $2 $1_wm_t:fifo_file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wm_write_pipes'($*)) dnl
+ ')
+
+## Chromium browser
+
+#######################################
+##
+## Role access for chromium
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`chromium_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chromium_role'($*)) dnl
+
+ gen_require(`
+ type chromium_t;
+ type chromium_renderer_t;
+ type chromium_sandbox_t;
+ type chromium_naclhelper_t;
+ class dbus send_msg;
+ ')
+
+ role $1 types chromium_t;
+ role $1 types chromium_renderer_t;
+ role $1 types chromium_sandbox_t;
+ role $1 types chromium_naclhelper_t;
+
+ # Transition from the user domain to the derived domain
+ chromium_domtrans($2)
+
+ # Allow ps to show chromium processes and allow the user to signal it
+ ps_process_pattern($2, chromium_t)
+ ps_process_pattern($2, chromium_renderer_t)
+
+ allow $2 chromium_t:process signal_perms;
+ allow $2 chromium_renderer_t:process signal_perms;
+ allow $2 chromium_naclhelper_t:process signal_perms;
+
+ allow chromium_sandbox_t $2:fd use;
+ allow chromium_naclhelper_t $2:fd use;
+
+ allow $2 chromium_t:dbus send_msg;
+ allow chromium_t $2:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chromium_role'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read-write access to Chromiums' temporary fifo files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`chromium_rw_tmp_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chromium_rw_tmp_pipes'($*)) dnl
+
+ gen_require(`
+ type chromium_tmp_t;
+ ')
+
+ rw_fifo_files_pattern($1, chromium_tmp_t, chromium_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chromium_rw_tmp_pipes'($*)) dnl
+ ')
+
+
+##############################################
+##
+## Automatically use the specified type for resources created in chromium's
+## temporary locations
+##
+##
+##
+## Domain that creates the resource(s)
+##
+##
+##
+##
+## Type of the resource created
+##
+##
+##
+##
+## The name of the resource being created
+##
+##
+#
+ define(`chromium_tmp_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chromium_tmp_filetrans'($*)) dnl
+
+ gen_require(`
+ type chromium_tmp_t;
+ ')
+
+ search_dirs_pattern($1, chromium_tmp_t, chromium_tmp_t)
+ filetrans_pattern($1, chromium_tmp_t, $2, $3, $4)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chromium_tmp_filetrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute a domain transition to the chromium domain (chromium_t)
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`chromium_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chromium_domtrans'($*)) dnl
+
+ gen_require(`
+ type chromium_t;
+ type chromium_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, chromium_exec_t, chromium_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chromium_domtrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute chromium in the chromium domain and allow the specified role to access the chromium domain
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Role allowed access
+##
+##
+#
+ define(`chromium_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `chromium_run'($*)) dnl
+
+ gen_require(`
+ type chromium_t;
+ ')
+
+ chromium_domtrans($1)
+ role $2 types chromium_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `chromium_run'($*)) dnl
+ ')
+
+## User network interface configuration helper.
+
+########################################
+##
+## Execute usernetctl in the usernetctl domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`usernetctl_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usernetctl_domtrans'($*)) dnl
+
+ gen_require(`
+ type usernetctl_t, usernetctl_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, usernetctl_exec_t, usernetctl_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usernetctl_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute usernetctl in the usernetctl
+## domain, and allow the specified role
+## the usernetctl domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`usernetctl_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `usernetctl_run'($*)) dnl
+
+ gen_require(`
+ attribute_role usernetctl_roles;
+ ')
+
+ usernetctl_domtrans($1)
+ roleattribute $2 usernetctl_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `usernetctl_run'($*)) dnl
+ ')
+
+## Thunderbird email client.
+
+########################################
+##
+## Role access for thunderbird.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`thunderbird_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `thunderbird_role'($*)) dnl
+
+ gen_require(`
+ attribute_role thunderbird_roles;
+ type thunderbird_t, thunderbird_exec_t, thunderbird_home_t;
+ type thunderbird_tmpfs_t;
+ ')
+
+ roleattribute $1 thunderbird_roles;
+
+ domtrans_pattern($2, thunderbird_exec_t, thunderbird_t)
+
+ stream_connect_pattern($2, thunderbird_tmpfs_t, thunderbird_tmpfs_t, thunderbird_t)
+
+ allow thunderbird_t $2:unix_stream_socket connectto;
+
+ allow $2 thunderbird_t:process { ptrace signal_perms };
+ ps_process_pattern($2, thunderbird_t)
+
+ allow $2 thunderbird_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 thunderbird_home_t:file { manage_file_perms relabel_file_perms };
+ allow $2 thunderbird_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, thunderbird_home_t, dir, ".thunderbird")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `thunderbird_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute thunderbird in the thunderbird domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`thunderbird_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `thunderbird_domtrans'($*)) dnl
+
+ gen_require(`
+ type thunderbird_t, thunderbird_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, thunderbird_exec_t, thunderbird_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `thunderbird_domtrans'($*)) dnl
+ ')
+
+## Pulseaudio network sound server.
+
+########################################
+##
+## Role access for pulseaudio.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`pulseaudio_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_role'($*)) dnl
+
+ gen_require(`
+ attribute pulseaudio_tmpfsfile;
+ type pulseaudio_t, pulseaudio_home_t, pulseaudio_tmpfs_t;
+ type pulseaudio_tmp_t;
+ ')
+
+ pulseaudio_run($2, $1)
+
+ allow $2 pulseaudio_t:process { ptrace signal_perms };
+ allow $2 pulseaudio_t:fd use;
+ ps_process_pattern($2, pulseaudio_t)
+
+ allow $2 pulseaudio_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 pulseaudio_home_t:file { manage_file_perms relabel_file_perms };
+ allow $2 pulseaudio_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+
+ allow $2 { pulseaudio_tmpfs_t pulseaudio_tmpfsfile }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { pulseaudio_tmpfs_t pulseaudio_tmpfsfile }:file { manage_file_perms relabel_file_perms map };
+
+ allow $2 pulseaudio_tmp_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 pulseaudio_tmp_t:file { manage_file_perms relabel_file_perms };
+ allow $2 pulseaudio_tmp_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ allow pulseaudio_t $2:unix_stream_socket connectto;
+ allow pulseaudio_t $2:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run pulseaudio.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`pulseaudio_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_domtrans'($*)) dnl
+
+ gen_require(`
+ attribute pulseaudio_client;
+ type pulseaudio_t, pulseaudio_exec_t;
+ ')
+
+ typeattribute $1 pulseaudio_client;
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, pulseaudio_exec_t, pulseaudio_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute pulseaudio in the pulseaudio
+## domain, and allow the specified role
+## the pulseaudio domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`pulseaudio_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_run'($*)) dnl
+
+ gen_require(`
+ attribute_role pulseaudio_roles;
+ ')
+
+ pulseaudio_domtrans($1)
+ roleattribute $2 pulseaudio_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute pulseaudio in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_exec'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, pulseaudio_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to execute pulseaudio.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`pulseaudio_dontaudit_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_dontaudit_exec'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_exec_t;
+ ')
+
+ dontaudit $1 pulseaudio_exec_t:file exec_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_dontaudit_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send null signals to pulseaudio.
+## processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_signull',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_signull'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_t;
+ ')
+
+ allow $1 pulseaudio_t:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_signull'($*)) dnl
+ ')
+
+
+########################################
+##
+## Use file descriptors for
+## pulseaudio.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_use_fds'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_t;
+ ')
+
+ allow $1 pulseaudio_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to use the
+## file descriptors for pulseaudio.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_t;
+ ')
+
+ dontaudit $1 pulseaudio_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+#####################################
+##
+## Connect to pulseaudio with a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_stream_connect'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_t, pulseaudio_runtime_t, pulseaudio_tmp_t;
+ ')
+
+ files_search_pids($1)
+ stream_connect_pattern($1, { pulseaudio_tmp_t pulseaudio_runtime_t }, { pulseaudio_tmp_t pulseaudio_runtime_t }, pulseaudio_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive messages from
+## pulseaudio over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 pulseaudio_t:dbus send_msg;
+ allow pulseaudio_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set attributes of pulseaudio home directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_setattr_home_dir',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_setattr_home_dir'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_home_t;
+ ')
+
+ allow $1 pulseaudio_home_t:dir setattr_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_setattr_home_dir'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read pulseaudio home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_read_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_read_home'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 pulseaudio_home_t:dir list_dir_perms;
+ allow $1 pulseaudio_home_t:file read_file_perms;
+ allow $1 pulseaudio_home_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_read_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write Pulse Audio files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_rw_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_rw_home_files'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ rw_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+ read_lnk_files_pattern($1, pulseaudio_home_t, pulseaudio_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_rw_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## pulseaudio home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_manage_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_manage_home'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 pulseaudio_home_t:dir manage_dir_perms;
+ allow $1 pulseaudio_home_t:file manage_file_perms;
+ allow $1 pulseaudio_home_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_manage_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in user home
+## directories with the pulseaudio
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`pulseaudio_home_filetrans_pulseaudio_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_home_filetrans_pulseaudio_home'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, pulseaudio_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_home_filetrans_pulseaudio_home'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make the specified tmpfs file type
+## pulseaudio tmpfs content.
+##
+##
+##
+## File type to make pulseaudio tmpfs content.
+##
+##
+#
+ define(`pulseaudio_tmpfs_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_tmpfs_content'($*)) dnl
+
+ gen_require(`
+ attribute pulseaudio_tmpfsfile;
+ ')
+
+ typeattribute $1 pulseaudio_tmpfsfile;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_tmpfs_content'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read pulseaudio tmpfs files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_read_tmpfs_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_read_tmpfs_files'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_tmpfs_t;
+ ')
+
+ fs_search_tmpfs($1)
+ read_files_pattern($1, pulseaudio_tmpfs_t, pulseaudio_tmpfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_read_tmpfs_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Read and write pulseaudio tmpfs
+## files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`pulseaudio_rw_tmpfs_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_rw_tmpfs_files'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_tmpfs_t;
+ ')
+
+ fs_search_tmpfs($1)
+ rw_files_pattern($1, pulseaudio_tmpfs_t, pulseaudio_tmpfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_rw_tmpfs_files'($*)) dnl
+ ')
+
+
+# Below are Gentoo specifics but ifdef distro_gentoo cannot be used in interfaces
+
+########################################
+##
+## Mark the specified domain as a PulseAudio client domain
+## and the related tmpfs file type as a (shared) PulseAudio tmpfs
+## file type used for the shared memory access
+##
+##
+##
+## Domain to become a PulseAudio client domain
+##
+##
+##
+##
+## Tmpfs type used for shared memory of the given domain
+##
+##
+#
+ define(`pulseaudio_client_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pulseaudio_client_domain'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated')
+
+ pulseaudio_domtrans($1)
+ pulseaudio_tmpfs_content($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pulseaudio_client_domain'($*)) dnl
+ ')
+
+## Mplayer media player and encoder.
+
+########################################
+##
+## Role access for mplayer
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`mplayer_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_role'($*)) dnl
+
+ gen_require(`
+ attribute_role mencoder_roles, mplayer_roles;
+ type mencoder_t, mencoder_exec_t, mplayer_home_t;
+ type mplayer_t, mplayer_exec_t, mplayer_tmpfs_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 mencoder_roles;
+ roleattribute $1 mplayer_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, mencoder_exec_t, mencoder_t)
+ domtrans_pattern($2, mplayer_exec_t, mplayer_t)
+
+ allow $2 { mplayer_t mencoder_t }:process { ptrace signal_perms };
+ ps_process_pattern($2, { mplayer_t mencoder_t })
+
+ allow $2 mplayer_home_t:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 mplayer_home_t:file { manage_file_perms relabel_file_perms };
+ allow $2 mplayer_home_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ userdom_user_home_dir_filetrans($2, mplayer_home_t, dir, ".mplayer")
+
+ allow $2 mplayer_tmpfs_t:file { manage_file_perms relabel_file_perms };
+ allow $2 mplayer_tmpfs_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 mplayer_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 mplayer_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Run mplayer in mplayer domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`mplayer_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_domtrans'($*)) dnl
+
+ gen_require(`
+ type mplayer_t, mplayer_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, mplayer_exec_t, mplayer_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute mplayer in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+#
+ define(`mplayer_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_exec'($*)) dnl
+
+ gen_require(`
+ type mplayer_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, mplayer_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read mplayer user home content files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mplayer_read_user_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_read_user_home_files'($*)) dnl
+
+ gen_require(`
+ type mplayer_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ read_files_pattern($1, mplayer_home_t, mplayer_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_read_user_home_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## generic mplayer home content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`mplayer_manage_generic_home_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_manage_generic_home_content'($*)) dnl
+
+ gen_require(`
+ type mplayer_home_t;
+ ')
+
+ userdom_search_user_home_dirs($1)
+ allow $1 mplayer_home_t:dir manage_dir_perms;
+ allow $1 mplayer_home_t:file manage_file_perms;
+ allow $1 mplayer_home_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_manage_generic_home_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create specified objects in user home
+## directories with the generic mplayer
+## home type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Class of the object being created.
+##
+##
+##
+##
+## The name of the object being created.
+##
+##
+#
+ define(`mplayer_home_filetrans_mplayer_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mplayer_home_filetrans_mplayer_home'($*)) dnl
+
+ gen_require(`
+ type mplayer_home_t;
+ ')
+
+ userdom_user_home_dir_filetrans($1, mplayer_home_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mplayer_home_filetrans_mplayer_home'($*)) dnl
+ ')
+
+## Lock one or more sessions on the Linux console.
+
+#######################################
+##
+## Execute vlock in the vlock domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`vlock_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vlock_domtrans'($*)) dnl
+
+ gen_require(`
+ type vlock_t, vlock_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, vlock_exec_t, vlock_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vlock_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute vlock in the vlock domain,
+## and allow the specified role
+## the vlock domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed to access.
+##
+##
+##
+#
+ define(`vlock_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vlock_run'($*)) dnl
+
+ gen_require(`
+ attribute_role vlock_roles;
+ ')
+
+ vlock_domtrans($1)
+ roleattribute $2 vlock_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vlock_run'($*)) dnl
+ ')
+
+## User mode linux tools and services.
+
+########################################
+##
+## Role access for uml.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`uml_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uml_role'($*)) dnl
+
+ gen_require(`
+ attribute_role uml_roles;
+ type uml_t, uml_exec_t;
+ type uml_ro_t, uml_rw_t, uml_tmp_t;
+ type uml_tmpfs_t;
+ ')
+
+ roleattribute $1 uml_roles;
+
+ domtrans_pattern($2, uml_exec_t, uml_t)
+
+ dgram_send_pattern($2, uml_tmpfs_t, uml_tmpfs_t, uml_t)
+
+ allow uml_t $2:unix_dgram_socket sendto;
+
+ ps_process_pattern($2, uml_t)
+ allow $2 uml_t:process { ptrace signal_perms };
+
+ allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_exec_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { uml_ro_t uml_rw_t uml_tmp_t uml_tmpfs_t uml_exec_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ allow $2 { uml_ro_t uml_rw_t uml_tmpfs_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ userdom_user_home_dir_filetrans($2, uml_rw_t, dir, ".uml")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uml_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set attributes of uml pid sock files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`uml_setattr_util_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uml_setattr_util_sockets'($*)) dnl
+
+ gen_require(`
+ type uml_switch_runtime_t;
+ ')
+
+ allow $1 uml_switch_runtime_t:sock_file setattr_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uml_setattr_util_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## uml pid files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`uml_manage_util_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uml_manage_util_files'($*)) dnl
+
+ gen_require(`
+ type uml_switch_runtime_t;
+ ')
+
+ manage_files_pattern($1, uml_switch_runtime_t, uml_switch_runtime_t)
+ manage_lnk_files_pattern($1, uml_switch_runtime_t, uml_switch_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uml_manage_util_files'($*)) dnl
+ ')
+
+## Yum/Apt Mirroring.
+
+########################################
+##
+## Execute yam in the yam domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`yam_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `yam_domtrans'($*)) dnl
+
+ gen_require(`
+ type yam_t, yam_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, yam_exec_t, yam_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `yam_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute yam in the yam domain, and
+## allow the specified role the yam domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`yam_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `yam_run'($*)) dnl
+
+ gen_require(`
+ attribute_role yam_roles;
+ ')
+
+ yam_domtrans($1)
+ roleattribute $2 yam_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `yam_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read yam content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`yam_read_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `yam_read_content'($*)) dnl
+
+ gen_require(`
+ type yam_content_t;
+ ')
+
+ allow $1 yam_content_t:dir list_dir_perms;
+ read_files_pattern($1, yam_content_t, yam_content_t)
+ read_lnk_files_pattern($1, yam_content_t, yam_content_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `yam_read_content'($*)) dnl
+ ')
+
+## libmtp: An Initiatior implementation of the Media Transfer Protocol (MTP).
+
+###########################################################
+##
+## Role access for libmtp.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`libmtp_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `libmtp_role'($*)) dnl
+
+ gen_require(`
+ attribute_role libmtp_roles;
+ type libmtp_t, libmtp_exec_t;
+ ')
+
+ roleattribute $1 libmtp_roles;
+
+ domtrans_pattern($2, libmtp_exec_t, libmtp_t)
+
+ allow $2 libmtp_t:process { ptrace signal_perms };
+ ps_process_pattern($2, libmtp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `libmtp_role'($*)) dnl
+ ')
+
+## A Unix manpage-to-HTML converter.
+## Library for locking devices.
+
+########################################
+##
+## Role access for lockdev.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`lockdev_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `lockdev_role'($*)) dnl
+
+ gen_require(`
+ attribute_role lockdev_roles;
+ type lockdev_t, lockdev_exec_t;
+ ')
+
+ ########################################
+ #
+ # Declarations
+ #
+
+ roleattribute $1 lockdev_roles;
+
+ ########################################
+ #
+ # Policy
+ #
+
+ domtrans_pattern($2, lockdev_exec_t, lockdev_t)
+
+ allow $2 lockdev_t:process { ptrace signal_perms };
+ ps_process_pattern($2, lockdev_t)
+
+ allow lockdev_t $2:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `lockdev_role'($*)) dnl
+ ')
+
+## Policy for GNU Privacy Guard and related programs.
+
+############################################################
+##
+## Role access for gpg.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`gpg_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_role'($*)) dnl
+
+ gen_require(`
+ attribute_role gpg_roles, gpg_agent_roles, gpg_helper_roles, gpg_pinentry_roles;
+ type gpg_t, gpg_exec_t, gpg_agent_t;
+ type gpg_agent_exec_t, gpg_agent_tmp_t, gpg_helper_t;
+ type gpg_pinentry_t, gpg_pinentry_tmp_t, gpg_secret_t;
+ ')
+
+ roleattribute $1 gpg_roles;
+ roleattribute $1 gpg_agent_roles;
+ roleattribute $1 gpg_helper_roles;
+ roleattribute $1 gpg_pinentry_roles;
+
+ domtrans_pattern($2, gpg_exec_t, gpg_t)
+ domtrans_pattern($2, gpg_agent_exec_t, gpg_agent_t)
+
+ allow $2 self:process setrlimit;
+ allow $2 { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t }:process { ptrace signal_perms };
+ ps_process_pattern($2, { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t })
+
+ allow gpg_pinentry_t $2:process signull;
+ allow gpg_helper_t $2:fd use;
+ allow { gpg_t gpg_agent_t gpg_helper_t gpg_pinentry_t } $2:fifo_file { read write };
+
+ allow $2 { gpg_agent_tmp_t gpg_secret_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { gpg_agent_tmp_t gpg_secret_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 gpg_secret_t:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 { gpg_agent_tmp_t gpg_pinentry_tmp_t gpg_secret_t }:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ filetrans_pattern($2, gpg_secret_t, gpg_agent_tmp_t, sock_file, "log-socket")
+ userdom_user_home_dir_filetrans($2, gpg_secret_t, dir, ".gnupg")
+
+ optional_policy(`
+ gpg_pinentry_dbus_chat($2)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the gpg in the gpg domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`gpg_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_domtrans'($*)) dnl
+
+ gen_require(`
+ type gpg_t, gpg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, gpg_exec_t, gpg_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the gpg in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_exec'($*)) dnl
+
+ gen_require(`
+ type gpg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, gpg_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute gpg in a specified domain.
+##
+##
+##
+## Execute gpg in a specified domain.
+##
+##
+## No interprocess communication (signals, pipes,
+## etc.) is provided by this interface since
+## the domains are not owned by this module.
+##
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Domain to transition to.
+##
+##
+#
+ define(`gpg_spec_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_spec_domtrans'($*)) dnl
+
+ gen_require(`
+ type gpg_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domain_auto_transition_pattern($1, gpg_exec_t, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_spec_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute the gpg-agent in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_exec_agent',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_exec_agent'($*)) dnl
+
+ gen_require(`
+ type gpg_agent_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, gpg_agent_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_exec_agent'($*)) dnl
+ ')
+
+
+######################################
+##
+## Make gpg executable files an
+## entrypoint for the specified domain.
+##
+##
+##
+## The domain for which gpg_exec_t is an entrypoint.
+##
+##
+#
+ define(`gpg_entry_type',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_entry_type'($*)) dnl
+
+ gen_require(`
+ type gpg_exec_t;
+ ')
+
+ domain_entry_file($1, gpg_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_entry_type'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to gpg.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_signal'($*)) dnl
+
+ gen_require(`
+ type gpg_t;
+ ')
+
+ allow $1 gpg_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write gpg agent pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_rw_agent_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_rw_agent_pipes'($*)) dnl
+
+ gen_require(`
+ type gpg_agent_t;
+ ')
+
+ allow $1 gpg_agent_t:fifo_file rw_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_rw_agent_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to gpg agent socket
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_stream_connect_agent',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_stream_connect_agent'($*)) dnl
+
+ gen_require(`
+ type gpg_agent_t, gpg_agent_tmp_t;
+ type gpg_secret_t, gpg_runtime_t;
+ ')
+
+ stream_connect_pattern($1, gpg_agent_tmp_t, gpg_agent_tmp_t, gpg_agent_t)
+ allow $1 { gpg_secret_t gpg_runtime_t }:dir search_dir_perms;
+ userdom_search_user_runtime($1)
+ userdom_search_user_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_stream_connect_agent'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search gpg agent dirs.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_search_agent_tmp_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_search_agent_tmp_dirs'($*)) dnl
+
+ gen_require(`
+ type gpg_agent_tmp_t;
+ ')
+
+ allow $1 gpg_agent_tmp_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_search_agent_tmp_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## filetrans in gpg_agent_tmp_t dirs
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_agent_tmp_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_agent_tmp_filetrans'($*)) dnl
+
+ gen_require(`
+ type gpg_agent_tmp_t;
+ ')
+
+ filetrans_pattern($1, gpg_agent_tmp_t, $2, $3, $4)
+ userdom_search_user_runtime($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_agent_tmp_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## filetrans in gpg_runtime_t dirs
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_runtime_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_runtime_filetrans'($*)) dnl
+
+ gen_require(`
+ type gpg_runtime_t;
+ ')
+
+ filetrans_pattern($1, gpg_runtime_t, $2, $3, $4)
+ userdom_search_user_runtime($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_runtime_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## filetrans in gpg_secret_t dirs
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_secret_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_secret_filetrans'($*)) dnl
+
+ gen_require(`
+ type gpg_secret_t;
+ ')
+
+ filetrans_pattern($1, gpg_secret_t, $2, $3, $4)
+ allow $1 gpg_secret_t:dir search_dir_perms;
+ userdom_search_user_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_secret_filetrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send messages to and from gpg
+## pinentry over DBUS.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_pinentry_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_pinentry_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type gpg_pinentry_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 gpg_pinentry_t:dbus send_msg;
+ allow gpg_pinentry_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_pinentry_dbus_chat'($*)) dnl
+ ')
+
+
+########################################
+##
+## List gpg user secrets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`gpg_list_user_secrets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gpg_list_user_secrets'($*)) dnl
+
+ gen_require(`
+ type gpg_secret_t;
+ ')
+
+ list_dirs_pattern($1, gpg_secret_t, gpg_secret_t)
+ userdom_search_user_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gpg_list_user_secrets'($*)) dnl
+ ')
+
+## helper function for grantpt(3), changes ownship and permissions of pseudotty.
+
+########################################
+##
+## Execute a domain transition to run ptchown.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`ptchown_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ptchown_domtrans'($*)) dnl
+
+ gen_require(`
+ type ptchown_t, ptchown_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, ptchown_exec_t, ptchown_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ptchown_domtrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute ptchown in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`ptchown_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ptchown_exec'($*)) dnl
+
+ gen_require(`
+ type ptchown_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, ptchown_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ptchown_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute ptchown in the ptchown
+## domain, and allow the specified
+## role the ptchown domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`ptchown_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ptchown_run'($*)) dnl
+
+ gen_require(`
+ attribute_role ptchown_roles;
+ ')
+
+ ptchown_domtrans($1)
+ roleattribute $2 ptchown_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ptchown_run'($*)) dnl
+ ')
+
+## QEMU machine emulator and virtualizer.
+
+#######################################
+##
+## The template to define a qemu domain.
+##
+##
+##
+## Domain prefix to be used.
+##
+##
+#
+ define(`qemu_domain_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_domain_template'($*)) dnl
+
+ ##############################
+ #
+ # Declarations
+ #
+
+ type $1_t;
+ domain_type($1_t)
+
+ type $1_tmp_t;
+ files_tmp_file($1_tmp_t)
+
+ ##############################
+ #
+ # Policy
+ #
+
+ allow $1_t self:capability { dac_override dac_read_search };
+ allow $1_t self:process { execstack execmem signal getsched };
+ allow $1_t self:fifo_file rw_file_perms;
+ allow $1_t self:shm create_shm_perms;
+ allow $1_t self:unix_stream_socket create_stream_socket_perms;
+ allow $1_t self:tcp_socket create_stream_socket_perms;
+ allow $1_t self:tun_socket create;
+
+ manage_dirs_pattern($1_t, $1_tmp_t, $1_tmp_t)
+ manage_files_pattern($1_t, $1_tmp_t, $1_tmp_t)
+ files_tmp_filetrans($1_t, $1_tmp_t, { file dir })
+
+ kernel_read_system_state($1_t)
+
+ corenet_all_recvfrom_unlabeled($1_t)
+ corenet_all_recvfrom_netlabel($1_t)
+ corenet_tcp_sendrecv_generic_if($1_t)
+ corenet_tcp_sendrecv_generic_node($1_t)
+ corenet_tcp_bind_generic_node($1_t)
+ corenet_tcp_bind_vnc_port($1_t)
+ corenet_rw_tun_tap_dev($1_t)
+
+# dev_rw_kvm($1_t)
+
+ domain_use_interactive_fds($1_t)
+
+ files_read_etc_files($1_t)
+ files_read_usr_files($1_t)
+ files_read_var_files($1_t)
+ files_search_all($1_t)
+
+ fs_list_inotifyfs($1_t)
+ fs_rw_anon_inodefs_files($1_t)
+ fs_rw_tmpfs_files($1_t)
+
+ storage_raw_write_removable_device($1_t)
+ storage_raw_read_removable_device($1_t)
+
+ term_use_ptmx($1_t)
+ term_getattr_pty_fs($1_t)
+ term_use_generic_ptys($1_t)
+
+ miscfiles_read_localization($1_t)
+
+ sysnet_read_config($1_t)
+
+ userdom_use_user_terminals($1_t)
+ userdom_attach_admin_tun_iface($1_t)
+
+ optional_policy(`
+ samba_domtrans_smbd($1_t)
+ ')
+
+ optional_policy(`
+ virt_manage_images($1_t)
+ virt_read_config($1_t)
+ virt_read_lib_files($1_t)
+ virt_attach_tun_iface($1_t)
+ ')
+
+ optional_policy(`
+ xserver_stream_connect($1_t)
+ xserver_read_xdm_tmp_files($1_t)
+ xserver_read_xdm_pid($1_t)
+# xserver_xdm_rw_shm($1_t)
+ ')
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_domain_template'($*)) dnl
+ ')
+
+
+########################################
+##
+## Role access for qemu.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`qemu_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_role'($*)) dnl
+
+ gen_require(`
+ type qemu_t;
+ ')
+
+ qemu_run($2, $1)
+
+ allow $2 qemu_t:process { ptrace signal_perms };
+ ps_process_pattern($2, qemu_t)
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to run qemu.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`qemu_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_domtrans'($*)) dnl
+
+ gen_require(`
+ type qemu_t, qemu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, qemu_exec_t, qemu_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a qemu in the caller domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_exec'($*)) dnl
+
+ gen_require(`
+ type qemu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, qemu_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute qemu in the qemu domain,
+## and allow the specified role the
+## qemu domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`qemu_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_run'($*)) dnl
+
+ gen_require(`
+ attribute_role qemu_roles;
+ ')
+
+ qemu_domtrans($1)
+ roleattribute $2 qemu_roles;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read qemu process state files.
+##
+##
+##
+## Domain to allow access.
+##
+##
+#
+ define(`qemu_read_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_read_state'($*)) dnl
+
+ gen_require(`
+ type qemu_t;
+ ')
+
+ kernel_search_proc($1)
+ allow $1 qemu_t:dir list_dir_perms;
+ allow $1 qemu_t:file read_file_perms;
+ allow $1 qemu_t:lnk_file read_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_read_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set qemu scheduler.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_setsched',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_setsched'($*)) dnl
+
+ gen_require(`
+ type qemu_t;
+ ')
+
+ allow $1 qemu_t:process setsched;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_setsched'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic signals to qemu.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_signal'($*)) dnl
+
+ gen_require(`
+ type qemu_t;
+ ')
+
+ allow $1 qemu_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send kill signals to qemu.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_kill',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_kill'($*)) dnl
+
+ gen_require(`
+ type qemu_t;
+ ')
+
+ allow $1 qemu_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_kill'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to qemu with a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_stream_connect'($*)) dnl
+
+ gen_require(`
+ type qemu_t, qemu_runtime_t;
+ ')
+
+ files_search_pids($1)
+ stream_connect_pattern($1, qemu_runtime_t, qemu_runtime_t, qemu_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unlink qemu socket
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_delete_pid_sock_file',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_delete_pid_sock_file'($*)) dnl
+
+ gen_require(`
+ type qemu_runtime_t;
+ ')
+
+ allow $1 qemu_runtime_t:sock_file unlink;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_delete_pid_sock_file'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute a domain transition to
+## run qemu unconfined.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`qemu_domtrans_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_domtrans_unconfined'($*)) dnl
+
+ gen_require(`
+ type unconfined_qemu_t, qemu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, qemu_exec_t, unconfined_qemu_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_domtrans_unconfined'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## qemu temporary directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_manage_tmp_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_manage_tmp_dirs'($*)) dnl
+
+ gen_require(`
+ type qemu_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ manage_dirs_pattern($1, qemu_tmp_t, qemu_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_manage_tmp_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete
+## qemu temporary files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_manage_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_manage_tmp_files'($*)) dnl
+
+ gen_require(`
+ type qemu_tmp_t;
+ ')
+
+ files_search_tmp($1)
+ manage_files_pattern($1, qemu_tmp_t, qemu_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_manage_tmp_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute qemu in a specified domain.
+##
+##
+##
+## Execute qemu in a specified domain.
+##
+##
+## No interprocess communication (signals, pipes,
+## etc.) is provided by this interface since
+## the domains are not owned by this module.
+##
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Domain to transition to.
+##
+##
+#
+ define(`qemu_spec_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_spec_domtrans'($*)) dnl
+
+ gen_require(`
+ type qemu_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domain_auto_transition_pattern($1, qemu_exec_t, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_spec_domtrans'($*)) dnl
+ ')
+
+
+######################################
+##
+## Make qemu executable files an
+## entrypoint for the specified domain.
+##
+##
+##
+## The domain for which qemu_exec_t is an entrypoint.
+##
+##
+#
+ define(`qemu_entry_type',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_entry_type'($*)) dnl
+
+ gen_require(`
+ type qemu_exec_t;
+ ')
+
+ domain_entry_file($1, qemu_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_entry_type'($*)) dnl
+ ')
+
+
+# Gentoo specific but cannot use ifdef distro_gentoo here
+
+#######################################
+##
+## Read/write to qemu socket files in /var/run
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`qemu_rw_pid_sock_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `qemu_rw_pid_sock_files'($*)) dnl
+
+ gen_require(`
+ type qemu_runtime_t;
+ ')
+
+ allow $1 qemu_runtime_t:sock_file rw_sock_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `qemu_rw_pid_sock_files'($*)) dnl
+ ')
+
+## Wireshark packet capture tool.
+
+############################################################
+##
+## Role access for wireshark.
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+##
+## User domain for the role.
+##
+##
+#
+ define(`wireshark_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wireshark_role'($*)) dnl
+
+ gen_require(`
+ attribute_role wireshark_roles;
+ type wireshark_t, wireshark_exec_t, wireshark_home_t;
+ type wireshark_tmp_t, wireshark_tmpfs_t;
+ ')
+
+ roleattribute $1 wireshark_roles;
+
+ domtrans_pattern($2, wireshark_exec_t, wireshark_t)
+
+ allow $2 wireshark_t:process { ptrace signal_perms };
+ ps_process_pattern($2, wireshark_t)
+
+ allow $2 { wireshark_tmp_t wireshark_home_t wireshark_tmpfs_t }:dir { manage_dir_perms relabel_dir_perms };
+ allow $2 { wireshark_tmp_t wireshark_home_t wireshark_tmpfs_t }:file { manage_file_perms relabel_file_perms };
+ allow $2 { wireshark_home_t wireshark_tmpfs_t }:lnk_file { manage_lnk_file_perms relabel_lnk_file_perms };
+ allow $2 wireshark_tmpfs_t:sock_file { manage_sock_file_perms relabel_sock_file_perms };
+ allow $2 wireshark_tmpfs_t:fifo_file { manage_fifo_file_perms relabel_fifo_file_perms };
+ userdom_user_home_dir_filetrans($2, wireshark_home_t, dir, ".wireshark")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wireshark_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute wireshark in wireshark domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`wireshark_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `wireshark_domtrans'($*)) dnl
+
+ gen_require(`
+ type wireshark_t, wireshark_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, wireshark_exec_t, wireshark_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `wireshark_domtrans'($*)) dnl
+ ')
+
+## Links web browser
+
+#######################################
+##
+## The role interface for the links module.
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`links_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `links_role'($*)) dnl
+
+ gen_require(`
+ type links_t, links_exec_t, links_tmpfs_t, links_home_t;
+ ')
+
+ #######################################
+ #
+ # Declarations
+ #
+
+ role $1 types links_t;
+
+ ############################
+ #
+ # Policy
+ #
+
+ manage_dirs_pattern($2, links_home_t, links_home_t)
+ manage_files_pattern($2, links_home_t, links_home_t)
+ manage_lnk_files_pattern($2, links_home_t, links_home_t)
+
+ relabel_dirs_pattern($2, links_home_t, links_home_t)
+ relabel_files_pattern($2, links_home_t, links_home_t)
+ relabel_lnk_files_pattern($2, links_home_t, links_home_t)
+
+ domtrans_pattern($2, links_exec_t, links_t)
+
+ ps_process_pattern($2, links_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `links_role'($*)) dnl
+ ')
+
+## PHP FastCGI Process Manager
+
+#################################################
+##
+## Administrate a phpfpm environment
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`phpfpm_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `phpfpm_admin'($*)) dnl
+
+ gen_require(`
+ type phpfpm_t;
+ type phpfpm_log_t, phpfpm_tmp_t, phpfpm_runtime_t;
+ ')
+
+ allow $1 phpfpm_t:process { ptrace signal_perms };
+ ps_process_pattern($1, phpfpm_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, phpfpm_log_t)
+
+ files_list_tmp($1)
+ admin_pattern($1, phpfpm_tmp_t)
+
+ files_list_pids($1)
+ admin_pattern($1, phpfpm_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `phpfpm_admin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to phpfpm using a unix domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`phpfpm_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `phpfpm_stream_connect'($*)) dnl
+
+ gen_require(`
+ type phpfpm_t, phpfpm_runtime_t;
+ ')
+ stream_connect_pattern($1, phpfpm_runtime_t, phpfpm_runtime_t, phpfpm_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `phpfpm_stream_connect'($*)) dnl
+ ')
+
+## policy for dirsrv
+#
+# Provided by the 389-ds-base package
+
+########################################
+##
+## Execute a domain transition to run dirsrv.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dirsrv_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_domtrans'($*)) dnl
+
+ gen_require(`
+ type dirsrv_t, dirsrv_exec_t;
+ ')
+
+ domain_auto_transition_pattern($1, dirsrv_exec_t, dirsrv_t)
+
+ allow dirsrv_t $1:fd use;
+ allow dirsrv_t $1:fifo_file rw_file_perms;
+ allow dirsrv_t $1:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_domtrans'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Allow caller to signal dirsrv.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_signal'($*)) dnl
+
+ gen_require(`
+ type dirsrv_t;
+ ')
+
+ allow $1 dirsrv_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_signal'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send a null signal to dirsrv.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_signull',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_signull'($*)) dnl
+
+ gen_require(`
+ type dirsrv_t;
+ ')
+
+ allow $1 dirsrv_t:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_signull'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow a domain to manage dirsrv logs.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_manage_log',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_manage_log'($*)) dnl
+
+ gen_require(`
+ type dirsrv_var_log_t;
+ ')
+
+ allow $1 dirsrv_var_log_t:dir manage_dir_perms;
+ allow $1 dirsrv_var_log_t:file manage_file_perms;
+ allow $1 dirsrv_var_log_t:fifo_file manage_fifo_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_manage_log'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow a domain to manage dirsrv /var/lib files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_manage_var_lib',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_manage_var_lib'($*)) dnl
+
+ gen_require(`
+ type dirsrv_var_lib_t;
+ ')
+ allow $1 dirsrv_var_lib_t:dir manage_dir_perms;
+ allow $1 dirsrv_var_lib_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_manage_var_lib'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow a domain to manage dirsrv /var/run files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_manage_var_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_manage_var_run'($*)) dnl
+
+ gen_require(`
+ type dirsrv_runtime_t;
+ ')
+ allow $1 dirsrv_runtime_t:dir manage_dir_perms;
+ allow $1 dirsrv_runtime_t:file manage_file_perms;
+ allow $1 dirsrv_runtime_t:sock_file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_manage_var_run'($*)) dnl
+ ')
+
+
+######################################
+##
+## Allow a domain to create dirsrv pid directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_pid_filetrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_pid_filetrans'($*)) dnl
+
+ gen_require(`
+ type dirsrv_runtime_t;
+ ')
+ # Allow creating a dir in /var/run with this type
+ files_pid_filetrans($1, dirsrv_runtime_t, dir)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_pid_filetrans'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow a domain to read dirsrv /var/run files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_read_var_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_read_var_run'($*)) dnl
+
+ gen_require(`
+ type dirsrv_runtime_t;
+ ')
+ allow $1 dirsrv_runtime_t:dir list_dir_perms;
+ allow $1 dirsrv_runtime_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_read_var_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage dirsrv configuration files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_manage_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_manage_config'($*)) dnl
+
+ gen_require(`
+ type dirsrv_config_t;
+ ')
+
+ allow $1 dirsrv_config_t:dir manage_dir_perms;
+ allow $1 dirsrv_config_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_manage_config'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read dirsrv share files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dirsrv_read_share',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dirsrv_read_share'($*)) dnl
+
+ gen_require(`
+ type dirsrv_share_t;
+ ')
+
+ allow $1 dirsrv_share_t:dir list_dir_perms;
+ allow $1 dirsrv_share_t:file read_file_perms;
+ allow $1 dirsrv_share_t:lnk_file read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dirsrv_read_share'($*)) dnl
+ ')
+
+## Log file monitoring tool
+
+#######################################
+##
+## All of the rules required to administrate
+## a logsentry environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`logsentry_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `logsentry_admin'($*)) dnl
+
+ gen_require(`
+ type logsentry_t, logsentry_etc_t, logsentry_tmp_t, logsentry_filter_t;
+ ')
+
+ allow $1 logsentry_t:process { ptrace signal_perms };
+ ps_process_pattern($1, logsentry_t)
+
+ files_list_etc($1)
+ admin_pattern($1, logsentry_etc_t)
+ admin_pattern($1, logsentry_filter_t)
+
+ files_list_tmp($1)
+ admin_pattern($1, logsentry_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `logsentry_admin'($*)) dnl
+ ')
+
+## Ceph distributed object storage
+
+#########################################
+##
+## Create the individual Ceph domains
+##
+##
+##
+## The daemon (osd, mds or mon) for which the rules are created
+##
+##
+#
+ define(`ceph_domain_template',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ceph_domain_template'($*)) dnl
+
+ gen_require(`
+ attribute cephdomain;
+ attribute cephdata;
+ attribute cephpidfile;
+ attribute_role ceph_roles;
+
+ type ceph_runtime_t;
+ ')
+
+ type ceph_$1_t, cephdomain;
+ type ceph_$1_exec_t;
+ init_system_domain(ceph_$1_t, ceph_$1_exec_t)
+ role ceph_roles types ceph_$1_t;
+
+ type ceph_$1_data_t, cephdata;
+ files_type(ceph_$1_data_t)
+
+ type ceph_$1_runtime_t, cephpidfile;
+ typealias ceph_$1_runtime_t alias ceph_$1_var_run_t;
+ files_pid_file(ceph_$1_runtime_t)
+
+ ########################################
+ #
+ # Local policy
+ #
+ # Rules which cannot be made part of the domain
+
+ allow ceph_$1_t ceph_$1_runtime_t:file manage_file_perms;
+ allow ceph_$1_t ceph_$1_runtime_t:sock_file manage_file_perms;
+ allow ceph_$1_t ceph_$1_data_t:dir manage_dir_perms;
+ allow ceph_$1_t ceph_$1_data_t:file manage_file_perms;
+
+ filetrans_pattern(ceph_$1_t, ceph_runtime_t, ceph_$1_runtime_t, { file sock_file })
+
+ files_var_lib_filetrans(ceph_$1_t, ceph_$1_data_t, { file dir })
+ dnl
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ceph_domain_template'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Administrative access for Ceph
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`ceph_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ceph_admin'($*)) dnl
+
+ gen_require(`
+ attribute cephdomain, cephdata;
+ type ceph_initrc_exec_t, ceph_log_t;
+ type ceph_conf_t, ceph_key_t;
+ ')
+
+ allow $1 cephdomain:process { ptrace signal_perms };
+ ps_process_pattern($1, cephdomain)
+
+ init_startstop_service($1, $2, cephdomain, ceph_initrc_exec_t)
+ allow $1 ceph_initrc_exec_t:lnk_file read_lnk_file_perms;
+ allow $1 ceph_initrc_exec_t:file read_file_perms;
+
+ files_list_etc($1)
+ admin_pattern($1, ceph_conf_t)
+ admin_pattern($1, ceph_key_t)
+
+ admin_pattern($1, cephdata)
+
+ admin_pattern($1, ceph_log_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ceph_admin'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Read Ceph key files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`ceph_read_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `ceph_read_key'($*)) dnl
+
+ gen_require(`
+ type ceph_key_t;
+ ')
+
+ allow $1 ceph_key_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `ceph_read_key'($*)) dnl
+ ')
+
+## rtorrent torrent client
+
+#######################################
+##
+## Role access for rtorrent
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The user domain.
+##
+##
+#
+ define(`rtorrent_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rtorrent_role'($*)) dnl
+
+ gen_require(`
+ type rtorrent_t, rtorrent_exec_t, rtorrent_home_t, rtorrent_session_t;
+ ')
+
+ role $1 types rtorrent_t;
+
+ domtrans_pattern($2, rtorrent_exec_t, rtorrent_t)
+
+ allow $2 rtorrent_t:process signal_perms;
+
+ manage_files_pattern($2, rtorrent_home_t, rtorrent_home_t)
+
+ manage_files_pattern($2, rtorrent_session_t, rtorrent_session_t)
+ manage_dirs_pattern($2, rtorrent_session_t, rtorrent_session_t)
+
+ ps_process_pattern($2, rtorrent_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rtorrent_role'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Administer the rtorrent application.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`rtorrent_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `rtorrent_admin'($*)) dnl
+
+ gen_require(`
+ type rtorrent_t;
+ ')
+
+ allow $1 rtorrent_t:process ptrace;
+
+ rtorrent_role($2, $1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `rtorrent_admin'($*)) dnl
+ ')
+
+## Dropbox client - Store, Sync and Share Files Online
+
+#######################################
+##
+## The role for using the dropbox client.
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The user domain.
+##
+##
+#
+ define(`dropbox_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dropbox_role'($*)) dnl
+
+ gen_require(`
+ type dropbox_t;
+ type dropbox_exec_t;
+ type dropbox_home_t;
+ type dropbox_tmp_t;
+ ')
+
+ role $1 types dropbox_t;
+
+ domtrans_pattern($2, dropbox_exec_t, dropbox_t)
+
+ allow $2 dropbox_t:process { ptrace signal_perms };
+
+ manage_dirs_pattern($2, dropbox_home_t, dropbox_home_t)
+ manage_files_pattern($2, dropbox_home_t, dropbox_home_t)
+ manage_sock_files_pattern($2, dropbox_home_t, dropbox_home_t)
+
+ manage_files_pattern($2, dropbox_home_t, dropbox_exec_t)
+ manage_lnk_files_pattern($2, dropbox_home_t, dropbox_exec_t)
+
+ userdom_user_home_dir_filetrans($2, dropbox_home_t, dir, ".dropbox-dist")
+ filetrans_pattern($2, dropbox_home_t, dropbox_exec_t, file, "dropbox")
+ filetrans_pattern($2, dropbox_home_t, dropbox_exec_t, file, "dropboxd")
+
+ manage_dirs_pattern($2, dropbox_tmp_t, dropbox_tmp_t)
+ manage_files_pattern($2, dropbox_tmp_t, dropbox_tmp_t)
+
+ allow $2 dropbox_content_t:dir relabel_dir_perms;
+ allow $2 dropbox_content_t:file relabel_file_perms;
+
+ dropbox_manage_content($2)
+ dropbox_dbus_chat($2)
+
+ ps_process_pattern($2, dropbox_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dropbox_role'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Send and receive messages from the dropbox daemon
+## over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dropbox_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dropbox_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type dropbox_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 dropbox_t:dbus send_msg;
+ allow dropbox_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dropbox_dbus_chat'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow other domains to read dropbox's content files
+##
+##
+##
+## The domain that is allowed read access to the dropbox_content_t files
+##
+##
+#
+ define(`dropbox_read_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dropbox_read_content'($*)) dnl
+
+ gen_require(`
+ type dropbox_content_t;
+ ')
+
+ list_dirs_pattern($1, dropbox_content_t, dropbox_content_t)
+ read_files_pattern($1, dropbox_content_t, dropbox_content_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dropbox_read_content'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow other domains to manage dropbox's content files
+##
+##
+##
+## The domain that is allowed to manage the dropbox_content_t files and directories
+##
+##
+#
+ define(`dropbox_manage_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dropbox_manage_content'($*)) dnl
+
+ gen_require(`
+ type dropbox_content_t;
+ ')
+
+ manage_dirs_pattern($1, dropbox_content_t, dropbox_content_t)
+ manage_files_pattern($1, dropbox_content_t, dropbox_content_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dropbox_manage_content'($*)) dnl
+ ')
+
+
+## Policy for gorg
+
+#######################################
+##
+## Role access for gorg
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`gorg_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `gorg_role'($*)) dnl
+
+ gen_require(`
+ type gorg_t, gorg_exec_t;
+ ')
+
+ role $1 types gorg_t;
+
+ domain_auto_transition_pattern($2, gorg_exec_t, gorg_t)
+ allow $2 gorg_t:process { noatsecure siginh rlimitinh };
+ allow gorg_t $2:fd use;
+ allow gorg_t $2:process { sigchld signull };
+
+ ps_process_pattern($2, gorg_t)
+ allow $2 gorg_t:process signal_perms;
+ # Needed for command-usage (pipe)
+ allow gorg_t $2:fifo_file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `gorg_role'($*)) dnl
+ ')
+
+## uWSGI server for Python web applications
+
+########################################
+##
+## Connect to uwsgi using a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`uwsgi_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uwsgi_stream_connect'($*)) dnl
+
+ gen_require(`
+ type uwsgi_t, uwsgi_run_t;
+ ')
+
+ files_search_pids($1)
+ list_dirs_pattern($1, uwsgi_run_t, uwsgi_run_t)
+ stream_connect_pattern($1, uwsgi_run_t, uwsgi_run_t, uwsgi_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uwsgi_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage uwsgi content.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`uwsgi_manage_content',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uwsgi_manage_content'($*)) dnl
+
+ gen_require(`
+ type uwsgi_content_t;
+ ')
+
+ files_search_pids($1)
+ manage_dirs_pattern($1, uwsgi_content_t, uwsgi_content_t)
+ manage_files_pattern($1, uwsgi_content_t, uwsgi_content_t)
+ manage_lnk_files_pattern($1, uwsgi_content_t, uwsgi_content_t)
+
+ manage_files_pattern($1, uwsgi_content_exec_t, uwsgi_content_exec_t)
+ manage_lnk_files_pattern($1, uwsgi_content_exec_t, uwsgi_content_exec_t)
+
+ optional_policy(`
+ apache_manage_sys_content($1)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uwsgi_manage_content'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute uwsgi in the uwsgi domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`uwsgi_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uwsgi_domtrans'($*)) dnl
+
+ gen_require(`
+ type uwsgi_t, uwsgi_exec_t, uwsgi_content_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, uwsgi_exec_t, uwsgi_t)
+ domtrans_pattern($1, uwsgi_content_exec_t, uwsgi_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uwsgi_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute uwsgi in the callers domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`uwsgi_content_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uwsgi_content_exec'($*)) dnl
+
+ gen_require(`
+ type uwsgi_t, uwsgi_exec_t, uwsgi_content_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ can_exec($1, uwsgi_content_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uwsgi_content_exec'($*)) dnl
+ ')
+
+
+########################################
+##
+## All of the rules required to
+## administrate a uWSGI environment.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+##
+#
+ define(`uwsgi_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `uwsgi_admin'($*)) dnl
+
+ gen_require(`
+ type uwsgi_t, uwsgi_exec_t, uwsgi_conf_t;
+ type uwsgi_run_t, uwsgi_var_log_t, uwsgi_tmp_t;
+ type uwsgi_content_t, uwsgi_content_exec_t;
+ ')
+
+ allow $1 uwsgi_t:process { ptrace signal_perms };
+ ps_process_pattern($1, uwsgi_t)
+
+ files_search_etc($1)
+ admin_pattern($1, { uwsgi_conf_t uwsgi_exec_t })
+
+ files_search_var($1)
+ admin_pattern($1, { uwsgi_content_t uwsgi_content_exec_t })
+
+ logging_search_logs($1)
+ admin_pattern($1, { uwsgi_var_log_t })
+
+ files_search_pids($1)
+ admin_pattern($1, uwsgi_run_t)
+
+ files_search_tmp($1)
+ admin_pattern($1, uwsgi_tmp_t)
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, uwsgi_exec_t, uwsgi_t)
+ can_exec($1, uwsgi_content_exec_t)
+
+ optional_policy(`
+ apache_manage_sys_content($1)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `uwsgi_admin'($*)) dnl
+ ')
+
+## Mutt e-mail client
+
+#######################################
+##
+## The role for using the mutt application.
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The user domain.
+##
+##
+#
+ define(`mutt_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mutt_role'($*)) dnl
+
+ gen_require(`
+ type mutt_t, mutt_exec_t, mutt_home_t, mutt_conf_t, mutt_etc_t;
+ type mutt_tmp_t;
+ ')
+
+ role $1 types mutt_t;
+
+ domtrans_pattern($2, mutt_exec_t, mutt_t)
+
+ allow $2 mutt_t:process { ptrace signal_perms };
+
+ manage_dirs_pattern($2, mutt_home_t, mutt_home_t)
+ manage_files_pattern($2, mutt_home_t, mutt_home_t)
+
+ manage_dirs_pattern($2, mutt_conf_t, mutt_conf_t)
+ manage_files_pattern($2, mutt_conf_t, mutt_conf_t)
+
+ relabel_dirs_pattern($2, mutt_home_t, mutt_home_t)
+ relabel_files_pattern($2, mutt_home_t, mutt_home_t)
+
+ relabel_dirs_pattern($2, mutt_conf_t, mutt_conf_t)
+ relabel_files_pattern($2, mutt_conf_t, mutt_conf_t)
+
+ relabel_dirs_pattern($2, mutt_tmp_t, mutt_tmp_t)
+ relabel_files_pattern($2, mutt_tmp_t, mutt_tmp_t)
+
+ ps_process_pattern($2, mutt_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mutt_role'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow other domains to read mutt's home files
+##
+##
+##
+## The domain that is allowed read access to the mutt_home_t files
+##
+##
+#
+ define(`mutt_read_home_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mutt_read_home_files'($*)) dnl
+
+ gen_require(`
+ type mutt_home_t;
+ ')
+
+ read_files_pattern($1, mutt_home_t, mutt_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mutt_read_home_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow other domains to read mutt's temporary files
+##
+##
+##
+## The domain that is allowed read access to the temporary files
+##
+##
+#
+ define(`mutt_read_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mutt_read_tmp_files'($*)) dnl
+
+ gen_require(`
+ type mutt_tmp_t;
+ ')
+
+ read_files_pattern($1, mutt_tmp_t, mutt_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mutt_read_tmp_files'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow other domains to handle mutt's temporary files (used for instance
+## for e-mail drafts)
+##
+##
+##
+## The domain that is allowed read/write access to the temporary files
+##
+##
+#
+ define(`mutt_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `mutt_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type mutt_tmp_t;
+ ')
+
+ # The use of rw_files_pattern here is not needed, since this incurs the open privilege as well
+ allow $1 mutt_tmp_t:dir search_dir_perms;
+ allow $1 mutt_tmp_t:file { read write };
+ files_search_tmp($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `mutt_rw_tmp_files'($*)) dnl
+ ')
+
+## Dracut initramfs creation tool
+
+########################################
+##
+## Execute the dracut program in the dracut domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`dracut_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dracut_domtrans'($*)) dnl
+
+ gen_require(`
+ type dracut_t, dracut_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, dracut_exec_t, dracut_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dracut_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute dracut in the dracut domain, and
+## allow the specified role the dracut domain.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+##
+##
+## Role allowed access.
+##
+##
+#
+ define(`dracut_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dracut_run'($*)) dnl
+
+ gen_require(`
+ type dracut_t;
+ ')
+
+ dracut_domtrans($1)
+ role $2 types dracut_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dracut_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read/write dracut temporary files
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`dracut_rw_tmp_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `dracut_rw_tmp_files'($*)) dnl
+
+ gen_require(`
+ type dracut_tmp_t;
+ ')
+
+ files_search_var($1)
+ files_search_tmp($1)
+
+ rw_files_pattern($1, dracut_tmp_t, dracut_tmp_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `dracut_rw_tmp_files'($*)) dnl
+ ')
+
+
+## Infrastructure management toolset
+
+#########################################
+##
+## All the rules required to administer a salt master environment
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Role allowed access
+##
+##
+#
+ define(`salt_admin_master',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `salt_admin_master'($*)) dnl
+
+ gen_require(`
+ type salt_master_t;
+ type salt_master_initrc_exec_t;
+ type salt_master_exec_t;
+ type salt_etc_t;
+ type salt_runtime_t;
+ type salt_master_runtime_t;
+ attribute_role salt_master_roles;
+ ')
+
+ allow $1 salt_master_t:process { ptrace signal_perms };
+ ps_process_pattern($1, salt_master_t)
+
+ init_startstop_service($1, $2, salt_master_t, salt_master_initrc_exec_t)
+
+ # for debugging?
+ role_transition $2 salt_master_exec_t system_r;
+ domtrans_pattern($1, salt_master_exec_t, salt_master_t)
+
+ roleattribute $2 salt_master_roles;
+
+ files_list_etc($1)
+ admin_pattern($1, salt_etc_t, salt_etc_t)
+
+ allow $1 salt_runtime_t:dir search_dir_perms;
+ stream_connect_pattern($1, salt_master_runtime_t, salt_master_runtime_t, salt_master_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `salt_admin_master'($*)) dnl
+ ')
+
+
+#########################################
+##
+## All the rules required to administer a salt minion environment
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Role allowed access
+##
+##
+#
+ define(`salt_admin_minion',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `salt_admin_minion'($*)) dnl
+
+ gen_require(`
+ type salt_minion_t;
+ type salt_minion_initrc_exec_t;
+ type salt_minion_exec_t;
+ type salt_etc_t;
+ attribute_role salt_minion_roles;
+ ')
+
+ allow $1 salt_minion_t:process { ptrace signal_perms };
+ ps_process_pattern($1, salt_minion_t)
+
+ init_startstop_service($1, $2, salt_minion_t, salt_minion_initrc_exec_t)
+
+ # for debugging
+ role_transition $2 salt_minion_exec_t system_r;
+ domtrans_pattern($1, salt_minion_exec_t, salt_minion_t)
+
+ roleattribute $2 salt_minion_roles;
+
+ files_list_etc($1)
+ admin_pattern($1, salt_etc_t, salt_etc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `salt_admin_minion'($*)) dnl
+ ')
+
+## policy for kdeconnect
+
+########################################
+##
+## Execute kdeconnect in the kdeconnect domin.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`kdeconnect_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdeconnect_domtrans'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_t, kdeconnect_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, kdeconnect_exec_t, kdeconnect_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdeconnect_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Execute kdeconnect in the kdeconnect domain, and
+## allow the specified role the kdeconnect domain.
+##
+##
+##
+## Domain allowed to transition
+##
+##
+##
+##
+## The role to be allowed the kdeconnect domain.
+##
+##
+#
+ define(`kdeconnect_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdeconnect_run'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_t;
+ ')
+
+ kdeconnect_domtrans($1)
+ role $2 types kdeconnect_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdeconnect_run'($*)) dnl
+ ')
+
+
+########################################
+##
+## Role access for kdeconnect
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`kdeconnect_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdeconnect_role'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_t;
+ ')
+
+ role $1 types kdeconnect_t;
+
+ kdeconnect_domtrans($2)
+
+ allow $2 kdeconnect_t:unix_stream_socket connectto;
+ allow kdeconnect_t $2:unix_stream_socket { read write connectto };
+
+ ps_process_pattern($2, kdeconnect_t)
+ allow $2 kdeconnect_t:process { signull signal sigkill };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdeconnect_role'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Send and receive messages from the kdeconnect daemon
+## over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kdeconnect_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kdeconnect_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 kdeconnect_t:dbus send_msg;
+ allow kdeconnect_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kdeconnect_dbus_chat'($*)) dnl
+ ')
+
+## Android development tools - adb, fastboot, android studio
+
+#######################################
+##
+## The role for using the android tools.
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The user domain.
+##
+##
+#
+ define(`android_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `android_role'($*)) dnl
+
+ gen_require(`
+ type android_tools_t;
+ type android_tools_exec_t;
+ type android_home_t;
+ type android_tmp_t;
+ type android_java_t;
+ type android_java_exec_t;
+ type android_sdk_t;
+ ')
+
+ role $1 types android_tools_t;
+ role $1 types android_java_t;
+
+ domtrans_pattern($2, android_tools_exec_t, android_tools_t)
+ domtrans_pattern($2, android_java_exec_t, android_java_t)
+
+ allow $2 android_tools_t:process { ptrace signal_perms };
+ allow $2 android_java_t:process { ptrace signal_perms noatsecure siginh rlimitinh };
+
+ manage_dirs_pattern($2, android_home_t, android_home_t)
+ manage_files_pattern($2, android_home_t, android_home_t)
+ manage_lnk_files_pattern($2, android_home_t, android_home_t)
+
+ list_dirs_pattern($2, android_sdk_t, android_sdk_t)
+ read_files_pattern($2, android_sdk_t, android_sdk_t)
+ read_lnk_files_pattern($2, android_sdk_t, android_sdk_t)
+
+ userdom_user_home_dir_filetrans($2, android_home_t, dir, ".android")
+ userdom_user_home_dir_filetrans($2, android_home_t, dir, ".AndroidStudioBeta")
+ userdom_user_home_dir_filetrans($2, android_home_t, dir, ".AndroidStudio")
+
+ manage_dirs_pattern($2, android_tmp_t, android_tmp_t)
+ manage_files_pattern($2, android_tmp_t, android_tmp_t)
+
+ allow $2 android_home_t:dir relabel_dir_perms;
+ allow $2 android_home_t:file relabel_file_perms;
+ allow $2 android_tools_exec_t:file relabel_file_perms;
+
+ ps_process_pattern($2, android_tools_t)
+ ps_process_pattern($2, android_java_t)
+
+ android_dbus_chat($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `android_role'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Execute the android tools commands in the
+## android tools domain.
+##
+##
+##
+## Domain allowed access.
+##
+##
+
+ define(`android_tools_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `android_tools_domtrans'($*)) dnl
+
+ gen_require(`
+ type android_tools_t;
+ type android_tools_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, android_tools_exec_t, android_tools_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `android_tools_domtrans'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Send and receive messages from the android java
+## domain over dbus.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`android_dbus_chat',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `android_dbus_chat'($*)) dnl
+
+ gen_require(`
+ type android_java_t;
+ class dbus send_msg;
+ ')
+
+ allow $1 android_java_t:dbus send_msg;
+ allow android_java_t $1:dbus send_msg;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `android_dbus_chat'($*)) dnl
+ ')
+
+## OpenResolv network configuration management
+
+#########################################
+##
+## Mark the domain as a resolvconf client, automatically granting
+## the necessary privileges (execute resolvconf and type access).
+##
+##
+##
+## Domain to mark as a resolvconf client
+##
+##
+#
+ define(`resolvconf_client_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `resolvconf_client_domain'($*)) dnl
+
+ gen_require(`
+ attribute resolvconf_client;
+ ')
+
+ typeattribute $1 resolvconf_client;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `resolvconf_client_domain'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Assign the proper permissions to the domain, such as
+## executing resolvconf and accessing its types.
+##
+##
+##
+## Domain to assign proper permissions to
+##
+##
+#
+ define(`resolvconf_client_domain_privs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `resolvconf_client_domain_privs'($*)) dnl
+
+ resolvconf_domtrans($1)
+ resolvconf_generic_run_filetrans_run($1, dir, "resolvconf")
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `resolvconf_client_domain_privs'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Execute resolvconf and transition to the resolvconf_t domain
+##
+##
+##
+## Domain allowed to transition
+##
+##
+#
+ define(`resolvconf_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `resolvconf_domtrans'($*)) dnl
+
+ gen_require(`
+ type resolvconf_t;
+ type resolvconf_exec_t;
+ ')
+
+ domtrans_pattern($1, resolvconf_exec_t, resolvconf_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `resolvconf_domtrans'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Execute resolvconf in the calling domain (no transition)
+##
+##
+##
+## Domain allowed to execute
+##
+##
+#
+ define(`resolvconf_exec',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `resolvconf_exec'($*)) dnl
+
+ gen_require(`
+ type resolvconf_exec_t;
+ ')
+
+ can_exec($1, resolvconf_exec_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `resolvconf_exec'($*)) dnl
+ ')
+
+
+#########################################
+##
+## Transition to resolvconf_run_t when creating resources
+## inside the generic run directory
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Class on which a file transition has to occur
+##
+##
+##
+##
+## Name of the resource on which a file transition has to occur
+##
+##
+#
+ define(`resolvconf_generic_run_filetrans_run',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `resolvconf_generic_run_filetrans_run'($*)) dnl
+
+ gen_require(`
+ type resolvconf_runtime_t;
+ ')
+
+ files_pid_filetrans($1, resolvconf_runtime_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `resolvconf_generic_run_filetrans_run'($*)) dnl
+ ')
+
+##
+## Flash player
+##
+
+#####################################
+##
+## Manage the Flash player home files
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`flash_manage_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `flash_manage_home'($*)) dnl
+
+ gen_require(`
+ type flash_home_t;
+ ')
+
+ manage_files_pattern($1, flash_home_t, flash_home_t)
+ manage_dirs_pattern($1, flash_home_t, flash_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `flash_manage_home'($*)) dnl
+ ')
+
+####################################
+##
+## Relabel the flash home resources
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`flash_relabel_home',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `flash_relabel_home'($*)) dnl
+
+ gen_require(`
+ type flash_home_t;
+ ')
+
+ relabel_files_pattern($1, flash_home_t, flash_home_t)
+ relabel_dirs_pattern($1, flash_home_t, flash_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `flash_relabel_home'($*)) dnl
+ ')
+
+##
+## Google Talk
+##
+
+##########################################
+##
+## Grant the plugin domain the needed privileges to launch and
+## interact with the GoogleTalk application. Used for web browser
+## plugin domains.
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`googletalk_plugin_domain',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_plugin_domain'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_t;
+ type googletalk_plugin_xdg_config_t;
+ ')
+
+ allow $1 googletalk_plugin_t:fd use;
+ allow $1 googletalk_plugin_t:unix_stream_socket { read write };
+
+ allow googletalk_plugin_t $1:unix_dgram_socket sendto;
+
+ # GoogleTalk process binds on an unreserved port, the client (plugin)
+ # then connects to this port
+ corenet_tcp_connect_all_unreserved_ports($1)
+
+ googletalk_domtrans_plugin($1)
+
+ # Create .config/google-googletalkplugin with correct type
+ manage_dirs_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
+ manage_files_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
+ xdg_config_home_filetrans($1, googletalk_plugin_xdg_config_t, dir, "google-googletalkplugin")
+ xdg_search_config_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_plugin_domain'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute Google talk plugin in the Google talk plugin domain
+##
+##
+##
+## Domain allowed to transition
+##
+##
+#
+ define(`googletalk_domtrans_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_domtrans_plugin'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_t, googletalk_plugin_exec_t;
+ ')
+
+ corecmd_search_bin($1)
+ domtrans_pattern($1, googletalk_plugin_exec_t, googletalk_plugin_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_domtrans_plugin'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Execute Google talk plugin in the Google talk plugin domain,
+## and allow the specified role the google talk plugin domain.
+##
+##
+##
+## Domain allowed to transition
+##
+##
+##
+##
+## Role allowed access
+##
+##
+#
+ define(`googletalk_run_plugin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_run_plugin'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_t;
+ ')
+
+ googletalk_domtrans_plugin($1)
+ role $2 types googletalk_plugin_t;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_run_plugin'($*)) dnl
+ ')
+
+
+########################################
+##
+## Use the file descriptor of googletalk plugin
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`googletalk_use_plugin_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_use_plugin_fds'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_t;
+ ')
+
+ allow $1 googletalk_plugin_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_use_plugin_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write to the google talk plugin inherited stream sockets
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`googletalk_rw_inherited_plugin_unix_stream_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_rw_inherited_plugin_unix_stream_sockets'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_t;
+ ')
+
+ allow $1 googletalk_plugin_t:unix_stream_socket { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_rw_inherited_plugin_unix_stream_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create objects in the xdg config home location
+## with an automatic type transition to the googletalk
+## plugin xdg config home type
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## The class of the object to be created.
+##
+##
+##
+##
+## Name of the file or directory created
+##
+##
+#
+ define(`googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_xdg_config_t;
+ ')
+
+ xdg_config_home_filetrans($1, googletalk_plugin_xdg_config_t, $2, $3)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_generic_xdg_config_home_filetrans_plugin_xdg_config'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Manage google talk plugin xdg configuration
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`googletalk_manage_plugin_xdg_config',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `googletalk_manage_plugin_xdg_config'($*)) dnl
+
+ gen_require(`
+ type googletalk_plugin_xdg_config_t;
+ ')
+
+ manage_dirs_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
+ manage_files_pattern($1, googletalk_plugin_xdg_config_t, googletalk_plugin_xdg_config_t)
+
+ xdg_search_config_home_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `googletalk_manage_plugin_xdg_config'($*)) dnl
+ ')
+
+## At daemon for running a task a single time
+
+########################################
+##
+## Role access for at
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`at_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `at_role'($*)) dnl
+
+ gen_require(`
+ type at_exec_t;
+ type at_t;
+ type atd_t;
+ type at_job_log_t;
+ type at_job_t;
+ ')
+
+ ##############################
+ #
+ # Declarations
+ #
+
+ role $1 types at_t;
+
+ ##############################
+ #
+ # Local policy
+ #
+
+ domtrans_pattern($2, at_exec_t, at_t)
+
+ allow $2 at_t:process signal_perms;
+
+ ps_process_pattern($2, at_t)
+
+ allow atd_t $2:process transition;
+ allow atd_t $2:fd use;
+ allow atd_t $2:key manage_key_perms;
+ dontaudit atd_t $2:process { noatsecure siginh rlimitinh };
+
+ allow $2 atd_t:process sigchld;
+ allow $2 atd_t:fd use;
+
+ allow $2 at_job_t:file read_inherited_file_perms;
+ allow $2 at_job_log_t:file rw_inherited_file_perms;
+
+ corecmd_shell_entry_type($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `at_role'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read from and write to the the inherited atd
+## joblog file
+##
+##
+##
+## Domain allowed access
+##
+##
+#
+ define(`at_rw_inherited_job_log_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `at_rw_inherited_job_log_files'($*)) dnl
+
+ gen_require(`
+ type at_job_log_t;
+ ')
+
+ allow $1 at_job_log_t:file rw_inherited_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `at_rw_inherited_job_log_files'($*)) dnl
+ ')
+
+## Subsonic Music Streaming Server
+## Pan news reader client
+
+########################################
+##
+## Role access for pan
+##
+##
+##
+## Role allowed access
+##
+##
+##
+##
+## User domain for the role
+##
+##
+#
+ define(`pan_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `pan_role'($*)) dnl
+
+ gen_require(`
+ type pan_t, pan_exec_t, pan_home_t;
+ ')
+ role $1 types pan_t;
+
+ allow $2 pan_t:process signal_perms;
+
+ domtrans_pattern($2, pan_exec_t, pan_t)
+
+ ps_process_pattern($2, pan_t)
+
+ manage_dirs_pattern($2, pan_home_t, pan_home_t)
+ manage_files_pattern($2, pan_home_t, pan_home_t)
+ manage_lnk_files_pattern($2, pan_home_t, pan_home_t)
+
+ relabel_dirs_pattern($2, pan_home_t, pan_home_t)
+ relabel_files_pattern($2, pan_home_t, pan_home_t)
+ relabel_lnk_files_pattern($2, pan_home_t, pan_home_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `pan_role'($*)) dnl
+ ')
+
+
+###############################################################################
+# SELinux module for the NGINX Web Server
+#
+# Project Contact Information:
+# Stuart Cianos
+# Email: scianos@alphavida.com
+#
+###############################################################################
+# (C) Copyright 2009 by Stuart Cianos, d/b/a AlphaVida. All Rights Reserved.
+#
+#
+# Stuart Cianos licenses this file to You under the GNU General Public License,
+# Version 3.0 (the "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.gnu.org/licenses/gpl.txt
+#
+# or in the COPYING file included in the original archive.
+#
+# Disclaimer of Warranty.
+#
+# THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
+# APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
+# HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
+# OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
+# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+# PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
+# IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
+# ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+#
+# Limitation of Liability.
+#
+# IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
+# WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
+# THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
+# GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
+# USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
+# DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
+# PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
+# EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
+# SUCH DAMAGES.
+###############################################################################
+## policy for nginx
+
+########################################
+##
+## Execute a domain transition to run nginx.
+##
+##
+##
+## Domain allowed to transition.
+##
+##
+#
+ define(`nginx_domtrans',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `nginx_domtrans'($*)) dnl
+
+ gen_require(`
+ type nginx_t, nginx_exec_t;
+ ')
+ allow nginx_t $1:fd use;
+ allow nginx_t $1:fifo_file rw_file_perms;
+ allow nginx_t $1:process sigchld;
+
+ domain_auto_transition_pattern($1, nginx_exec_t, nginx_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `nginx_domtrans'($*)) dnl
+ ')
+
+
+########################################
+##
+## Administer the nginx domain
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## The role to be allowed to manage the nginx domain.
+##
+##
+##
+#
+ define(`nginx_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `nginx_admin'($*)) dnl
+
+ gen_require(`
+ type nginx_t, nginx_conf_t, nginx_log_t, nginx_var_lib_t, nginx_runtime_t;
+ type nginx_exec_t;
+ ')
+
+ allow $1 nginx_t:process { ptrace signal_perms };
+ ps_process_pattern($1, nginx_t)
+
+ files_list_etc($1)
+ admin_pattern($1, nginx_conf_t)
+
+ can_exec($1, nginx_exec_t)
+
+ files_list_var_lib($1)
+ admin_pattern($1, nginx_var_lib_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, nginx_log_t)
+
+ files_list_pids($1)
+ admin_pattern($1, nginx_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `nginx_admin'($*)) dnl
+ ')
+
+## Skype softphone.
+
+#######################################
+##
+## Role access for the skype module.
+##
+##
+##
+## The role associated with the user domain.
+##
+##
+##
+##
+## The type of the user domain.
+##
+##
+#
+ define(`skype_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `skype_role'($*)) dnl
+
+ gen_require(`
+ type skype_t, skype_exec_t, skype_tmpfs_t, skype_home_t;
+ ')
+
+ role $1 types skype_t;
+
+ domtrans_pattern($2, skype_exec_t, skype_t)
+
+ allow $2 skype_t:process { ptrace signal_perms };
+ dontaudit skype_t $2:unix_stream_socket { connectto };
+
+ manage_dirs_pattern($2, skype_home_t, skype_home_t)
+ manage_files_pattern($2, skype_home_t, skype_home_t)
+ manage_lnk_files_pattern($2, skype_home_t, skype_home_t)
+
+ relabel_dirs_pattern($2, skype_home_t, skype_home_t)
+ relabel_files_pattern($2, skype_home_t, skype_home_t)
+ relabel_lnk_files_pattern($2, skype_home_t, skype_home_t)
+
+ ps_process_pattern($2, skype_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `skype_role'($*)) dnl
+ ')
+
+## OpenRC is an init system
+## Build whatis database from man pages
+## Virtual Distributed Ethernet switch service
+
+########################################
+##
+# The rules needed to manage the VDE switches
+##
+##
+##
+## The role to be allowed to manage the vde domain.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`vde_role',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vde_role'($*)) dnl
+
+ gen_require(`
+ type vde_t, vde_tmp_t;
+ type vde_runtime_t;
+ type vde_initrc_exec_t, vde_exec_t;
+ ')
+
+ role $1 types vde_t;
+
+ allow $2 vde_t:process { ptrace signal_perms };
+ allow $2 vde_t:unix_stream_socket connectto;
+ allow vde_t $2:process { sigchld signull };
+ allow vde_t $2:fd use;
+ allow vde_t $2:tun_socket { relabelfrom };
+ allow vde_t self:tun_socket { relabelfrom relabelto };
+ ps_process_pattern($2, vde_t)
+
+ domain_auto_transition_pattern($2, vde_exec_t, vde_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vde_role'($*)) dnl
+ ')
+
+
+########################################
+##
+# Allow communication with the VDE service
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`vde_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `vde_connect'($*)) dnl
+
+ gen_require(`
+ type vde_t, vde_runtime_t, vde_tmp_t;
+ ')
+
+ allow $1 vde_runtime_t:sock_file write_sock_file_perms;
+ allow $1 vde_t:unix_stream_socket { connectto };
+ allow $1 vde_t:unix_dgram_socket { sendto };
+ allow vde_t $1:unix_dgram_socket { sendto };
+
+ allow $1 vde_tmp_t:sock_file manage_sock_file_perms;
+ files_tmp_filetrans($1, vde_tmp_t, sock_file)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `vde_connect'($*)) dnl
+ ')
+
+## Bitcoin software-based online payment system
+
+#########################################
+##
+## Administer a bitcoin environment
+##
+##
+##
+## Domain allowed access
+##
+##
+##
+##
+## Role allowed access
+##
+##
+#
+ define(`bitcoin_admin',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `bitcoin_admin'($*)) dnl
+
+ gen_require(`
+ type bitcoin_t;
+ type bitcoin_etc_t, bitcoin_tmp_t, bitcoin_log_t;
+ type bitcoin_var_lib_t, bitcoin_runtime_t;
+ type bitcoin_initrc_exec_t;
+ ')
+
+ allow $1 bitcoin_t:process { ptrace signal_perms };
+ ps_process_pattern($1, bitcoin_t)
+
+ init_startstop_service($1, $2, bitcoin_t, bitcoin_initrc_exec_t)
+
+ files_list_tmp($1)
+ admin_pattern($1, bitcoin_tmp_t)
+
+ logging_list_logs($1)
+ admin_pattern($1, bitcoin_log_t)
+
+ files_list_etc($1)
+ admin_pattern($1, bitcoin_etc_t)
+
+ files_list_var_lib($1)
+ admin_pattern($1, bitcoin_var_lib_t)
+
+ files_list_pids($1)
+ admin_pattern($1, bitcoin_runtime_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `bitcoin_admin'($*)) dnl
+ ')
+
+#
+# This is a generated file! Instead of modifying this file, the
+# corenetwork.if.in or corenetwork.if.m4 file should be modified.
+#
+## Policy controlling access to network objects
+##
+## Contains the initial SIDs for network objects.
+##
+
+########################################
+##
+## Define type to be a network port type
+##
+##
+##
+## Define type to be a network port type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for network ports.
+##
+##
+#
+ define(`corenet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_port'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ typeattribute $1 port_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define network type to be a reserved port (lt 1024)
+##
+##
+##
+## Define network type to be a reserved port (lt 1024)
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for network ports.
+##
+##
+#
+ define(`corenet_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_reserved_port'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ typeattribute $1 reserved_port_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define network type to be a rpc port ( 512 lt PORT lt 1024)
+##
+##
+##
+## Define network type to be a rpc port ( 512 lt PORT lt 1024)
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for network ports.
+##
+##
+#
+ define(`corenet_rpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_rpc_port'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ typeattribute $1 rpc_port_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_rpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be a network node type
+##
+##
+##
+## Define type to be a network node type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for network nodes.
+##
+##
+#
+ define(`corenet_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_node'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ typeattribute $1 node_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be a network packet type
+##
+##
+##
+## Define type to be a network packet type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for a network packet.
+##
+##
+#
+ define(`corenet_packet',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_packet'($*)) dnl
+
+ gen_require(`
+ attribute packet_type;
+ ')
+
+ typeattribute $1 packet_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_packet'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be a network client packet type
+##
+##
+##
+## Define type to be a network client packet type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for a network client packet.
+##
+##
+#
+ define(`corenet_client_packet',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_client_packet'($*)) dnl
+
+ gen_require(`
+ attribute packet_type, client_packet_type;
+ ')
+
+ typeattribute $1 client_packet_type, packet_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_client_packet'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be a network server packet type
+##
+##
+##
+## Define type to be a network server packet type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for a network server packet.
+##
+##
+#
+ define(`corenet_server_packet',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_server_packet'($*)) dnl
+
+ gen_require(`
+ attribute packet_type, server_packet_type;
+ ')
+
+ typeattribute $1 server_packet_type, packet_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_server_packet'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make the specified type usable
+## for labeled ipsec.
+##
+##
+##
+## Type to be used for labeled ipsec.
+##
+##
+#
+ define(`corenet_spd_type',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_spd_type'($*)) dnl
+
+ gen_require(`
+ attribute ipsec_spd_type;
+ ')
+
+ typeattribute $1 ipsec_spd_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_spd_type'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be an infiniband pkey type
+##
+##
+##
+## Define type to be an infiniband pkey type
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for infiniband pkeys.
+##
+##
+#
+ define(`corenet_ib_pkey',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_pkey'($*)) dnl
+
+ gen_require(`
+ attribute ibpkey_type;
+ ')
+
+ typeattribute $1 ibpkey_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_pkey'($*)) dnl
+ ')
+
+
+########################################
+##
+## Define type to be an infiniband endport
+##
+##
+##
+## Define type to be an infiniband endport
+##
+##
+## This is for supporting third party modules and its
+## use is not allowed in upstream reference policy.
+##
+##
+##
+##
+## Type to be used for infiniband endports.
+##
+##
+#
+ define(`corenet_ib_endport',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_endport'($*)) dnl
+
+ gen_require(`
+ attribute ibendport_type;
+ ')
+
+ typeattribute $1 ibendport_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_endport'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on generic interfaces.
+##
+##
+##
+## Allow the specified domain to send and receive TCP network
+## traffic on generic network interfaces.
+##
+##
+## Related interface:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_tcp_sendrecv_generic_node()
+## - corenet_tcp_sendrecv_all_ports()
+## - corenet_tcp_connect_all_ports()
+##
+##
+## Example client being able to connect to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:tcp_socket create_stream_socket_perms;
+## corenet_tcp_sendrecv_generic_if(myclient_t)
+## corenet_tcp_sendrecv_generic_node(myclient_t)
+## corenet_tcp_sendrecv_all_ports(myclient_t)
+## corenet_tcp_connect_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif { egress ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on generic interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Dontaudit attempts to send UDP network traffic
+## on generic interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ dontaudit $1 netif_t:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on generic interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP network
+## traffic on generic interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ dontaudit $1 netif_t:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on generic interfaces.
+##
+##
+##
+## Allow the specified domain to send and receive UDP network
+## traffic on generic network interfaces.
+##
+##
+## Related interface:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_udp_sendrecv_generic_node()
+## - corenet_udp_sendrecv_all_ports()
+##
+##
+## Example client being able to send to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:udp_socket create_socket_perms;
+## corenet_udp_sendrecv_generic_if(myclient_t)
+## corenet_udp_sendrecv_generic_node(myclient_t)
+## corenet_udp_sendrecv_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_if'($*)) dnl
+
+ corenet_udp_send_generic_if($1)
+ corenet_udp_receive_generic_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive UDP network
+## traffic on generic interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_generic_if'($*)) dnl
+
+ corenet_dontaudit_udp_send_generic_if($1)
+ corenet_dontaudit_udp_receive_generic_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send raw IP packets on generic interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_send_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_send_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_send_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive raw IP packets on generic interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_receive_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_receive_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive raw IP packets on generic interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_sendrecv_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_generic_if'($*)) dnl
+
+ corenet_raw_send_generic_if($1)
+ corenet_raw_receive_generic_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow outgoing network traffic on the generic interfaces.
+##
+##
+##
+## The peer label of the outgoing network traffic.
+##
+##
+##
+#
+ define(`corenet_out_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_out_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif egress;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_out_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow incoming traffic on the generic interfaces.
+##
+##
+##
+## The peer label of the incoming network traffic.
+##
+##
+##
+#
+ define(`corenet_in_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_in_generic_if'($*)) dnl
+
+ gen_require(`
+ type netif_t;
+ ')
+
+ allow $1 netif_t:netif ingress;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_in_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow incoming and outgoing network traffic on the generic interfaces.
+##
+##
+##
+## The peer label of the network traffic.
+##
+##
+##
+#
+ define(`corenet_inout_generic_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_inout_generic_if'($*)) dnl
+
+ corenet_in_generic_if($1)
+ corenet_out_generic_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_inout_generic_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_sendrecv_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_if'($*)) dnl
+
+ gen_require(`
+ attribute netif_type;
+ ')
+
+ allow $1 netif_type:netif { egress ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_if'($*)) dnl
+
+ gen_require(`
+ attribute netif_type;
+ ')
+
+ allow $1 netif_type:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_if'($*)) dnl
+
+ gen_require(`
+ attribute netif_type;
+ ')
+
+ allow $1 netif_type:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_sendrecv_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_if'($*)) dnl
+
+ corenet_udp_send_all_if($1)
+ corenet_udp_receive_all_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send raw IP packets on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_send_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_send_all_if'($*)) dnl
+
+ gen_require(`
+ attribute netif_type;
+ ')
+
+ allow $1 netif_type:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_send_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive SCTP network traffic on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_sendrecv_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_sendrecv_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_sendrecv_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive raw IP packets on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_receive_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_all_if'($*)) dnl
+
+ gen_require(`
+ attribute netif_type;
+ ')
+
+ allow $1 netif_type:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_receive_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive raw IP packets on all interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_sendrecv_all_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_all_if'($*)) dnl
+
+ corenet_raw_send_all_if($1)
+ corenet_raw_receive_all_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_all_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on generic nodes.
+##
+##
+##
+## Allow the specified domain to send and receive TCP network
+## traffic to/from generic network nodes (hostnames/networks).
+##
+##
+## Related interface:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_tcp_sendrecv_generic_if()
+## - corenet_tcp_sendrecv_all_ports()
+## - corenet_tcp_connect_all_ports()
+##
+##
+## Example client being able to connect to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:tcp_socket create_stream_socket_perms;
+## corenet_tcp_sendrecv_generic_if(myclient_t)
+## corenet_tcp_sendrecv_generic_node(myclient_t)
+## corenet_tcp_sendrecv_all_ports(myclient_t)
+## corenet_tcp_connect_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { sendto };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on generic nodes.
+##
+##
+##
+## Allow the specified domain to send and receive UDP network
+## traffic to/from generic network nodes (hostnames/networks).
+##
+##
+## Related interface:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_udp_sendrecv_generic_if()
+## - corenet_udp_sendrecv_all_ports()
+##
+##
+## Example client being able to send to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:udp_socket create_socket_perms;
+## corenet_udp_sendrecv_generic_if(myclient_t)
+## corenet_udp_sendrecv_generic_node(myclient_t)
+## corenet_udp_sendrecv_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_node'($*)) dnl
+
+ corenet_udp_send_generic_node($1)
+ corenet_udp_receive_generic_node($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send raw IP packets on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_send_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_send_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { sendto };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_send_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive raw IP packets on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_receive_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node { recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_receive_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive raw IP packets on generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_sendrecv_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_generic_node'($*)) dnl
+
+ corenet_raw_send_generic_node($1)
+ corenet_raw_receive_generic_node($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:sctp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to generic nodes.
+##
+##
+##
+## Bind TCP sockets to generic nodes. This is
+## necessary for binding a socket so it
+## can be used for servers to listen
+## for incoming connections.
+##
+##
+## Related interface:
+##
+##
+## - corenet_udp_bind_generic_node()
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:tcp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to generic nodes.
+##
+##
+##
+## Bind UDP sockets to generic nodes. This is
+## necessary for binding a socket so it
+## can be used for servers to listen
+## for incoming connections.
+##
+##
+## Related interface:
+##
+##
+## - corenet_tcp_bind_generic_node()
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:udp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind raw sockets to generic nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+# rawip_socket node_bind does not make much sense.
+# cjp: vmware hits this too
+ define(`corenet_raw_bind_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_bind_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:rawip_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_bind_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow outgoing network traffic to generic nodes.
+##
+##
+##
+## The peer label of the outgoing network traffic.
+##
+##
+##
+#
+ define(`corenet_out_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_out_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node sendto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_out_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow incoming network traffic from generic nodes.
+##
+##
+##
+## The peer label of the incoming network traffic.
+##
+##
+##
+#
+ define(`corenet_in_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_in_generic_node'($*)) dnl
+
+ gen_require(`
+ type node_t;
+ ')
+
+ allow $1 node_t:node recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_in_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow incoming and outgoing network traffic with generic nodes.
+##
+##
+##
+## The peer label of the network traffic.
+##
+##
+##
+#
+ define(`corenet_inout_generic_node',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_inout_generic_node'($*)) dnl
+
+ corenet_in_generic_node($1)
+ corenet_out_generic_node($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_inout_generic_node'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_sendrecv_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { sendto };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP network
+## traffic on any nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ dontaudit $1 node_type:node { sendto };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive SCTP network traffic on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_sendrecv_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_sendrecv_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_sendrecv_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP
+## network traffic on all nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ dontaudit $1 node_type:node { recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_sendrecv_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_nodes'($*)) dnl
+
+ corenet_udp_send_all_nodes($1)
+ corenet_udp_receive_all_nodes($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive UDP
+## network traffic on any nodes nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_all_nodes'($*)) dnl
+
+ corenet_dontaudit_udp_send_all_nodes($1)
+ corenet_dontaudit_udp_receive_all_nodes($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send raw IP packets on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_send_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_send_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { sendto };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_send_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive raw IP packets on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_receive_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:node { recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_receive_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive raw IP packets on all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_sendrecv_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_all_nodes'($*)) dnl
+
+ corenet_raw_send_all_nodes($1)
+ corenet_raw_receive_all_nodes($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:tcp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:udp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind raw sockets to all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+# rawip_socket node_bind does not make much sense.
+# cjp: vmware hits this too
+ define(`corenet_raw_bind_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_bind_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:rawip_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_bind_all_nodes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_sendrecv_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_generic_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to all nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_all_nodes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_nodes'($*)) dnl
+
+ gen_require(`
+ attribute node_type;
+ ')
+
+ allow $1 node_type:sctp_socket node_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_nodes'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Do not audit send and receive TCP network traffic on generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_sendrecv_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_sendrecv_generic_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_sendrecv_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_generic_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_generic_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_sendrecv_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_generic_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t;
+ attribute defined_port_type;
+ ')
+
+ allow $1 port_t:tcp_socket name_bind;
+ dontaudit $1 defined_port_type:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit bind TCP sockets to generic ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_bind_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t;
+ ')
+
+ dontaudit $1 port_t:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t;
+ attribute defined_port_type;
+ ')
+
+ allow $1 port_t:udp_socket name_bind;
+ dontaudit $1 defined_port_type:udp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t;
+ ')
+
+ allow $1 port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on all ports.
+##
+##
+##
+## Send and receive TCP network traffic on all ports.
+## Related interfaces:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_tcp_sendrecv_generic_if()
+## - corenet_tcp_sendrecv_generic_node()
+## - corenet_tcp_connect_all_ports()
+## - corenet_tcp_bind_all_ports()
+##
+##
+## Example client being able to connect to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:tcp_socket create_stream_socket_perms;
+## corenet_tcp_sendrecv_generic_if(myclient_t)
+## corenet_tcp_sendrecv_generic_node(myclient_t)
+## corenet_tcp_sendrecv_all_ports(myclient_t)
+## corenet_tcp_connect_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t, unreserved_port_t, ephemeral_port_t;
+ attribute defined_port_type;
+ ')
+
+ allow $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_bind;
+ dontaudit $1 defined_port_type:sctp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on all ports.
+##
+##
+##
+## Send and receive UDP network traffic on all ports.
+## Related interfaces:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_udp_sendrecv_generic_if()
+## - corenet_udp_sendrecv_generic_node()
+## - corenet_udp_bind_all_ports()
+##
+##
+## Example client being able to send to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:udp_socket create_socket_perms;
+## corenet_udp_sendrecv_generic_if(myclient_t)
+## corenet_udp_sendrecv_generic_node(myclient_t)
+## corenet_udp_sendrecv_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind SCTP
+## sockets to generic ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_sctp_bind_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t, unreserved_port_t, ephemeral_port_t;
+ ')
+
+ dontaudit $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ allow $1 port_type:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attepts to bind TCP sockets to any ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ dontaudit $1 port_type:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ allow $1 port_type:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect SCTP sockets to generic ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_connect_generic_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_generic_port'($*)) dnl
+
+ gen_require(`
+ type port_t, unreserved_port_t,ephemeral_port_t;
+ ')
+
+ allow $1 { port_t unreserved_port_t ephemeral_port_t }:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_generic_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attepts to bind UDP sockets to any ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ dontaudit $1 port_type:udp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to all ports.
+##
+##
+##
+## Connect TCP sockets to all ports
+##
+##
+## Related interfaces:
+##
+##
+## - corenet_all_recvfrom_unlabeled()
+## - corenet_tcp_sendrecv_generic_if()
+## - corenet_tcp_sendrecv_generic_node()
+## - corenet_tcp_sendrecv_all_ports()
+## - corenet_tcp_bind_all_ports()
+##
+##
+## Example client being able to connect to all ports over
+## generic nodes, without labeled networking:
+##
+##
+## allow myclient_t self:tcp_socket create_stream_socket_perms;
+## corenet_tcp_sendrecv_generic_if(myclient_t)
+## corenet_tcp_sendrecv_generic_node(myclient_t)
+## corenet_tcp_sendrecv_all_ports(myclient_t)
+## corenet_tcp_connect_all_ports(myclient_t)
+## corenet_all_recvfrom_unlabeled(myclient_t)
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_connect_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ allow $1 port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to connect TCP sockets
+## to all ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_connect_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ dontaudit $1 port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_sendrecv_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_reserved_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_reserved_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_reserved_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_sendrecv_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_reserved_port'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_reserved_port'($*)) dnl
+
+ gen_require(`
+ type reserved_port_t;
+ ')
+
+ allow $1 reserved_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ allow $1 port_type:sctp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_reserved_port'($*)) dnl
+
+ gen_require(`
+ type reserved_port_t;
+ ')
+
+ allow $1 reserved_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_reserved_port'($*)) dnl
+
+ gen_require(`
+ type reserved_port_t;
+ ')
+
+ allow $1 reserved_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind SCTP sockets to any ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_sctp_bind_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ dontaudit $1 port_type:sctp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive TCP network traffic on all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_sendrecv_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_all_reserved_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_send_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_all_reserved_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_receive_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_all_reserved_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_sendrecv_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_all_reserved_ports'($*)) dnl
+
+ refpolicywarn(`$0($*) has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect SCTP sockets to all ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_connect_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ allow $1 port_type:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ allow $1 reserved_port_type:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind TCP sockets to all reserved ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ dontaudit $1 reserved_port_type:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ allow $1 reserved_port_type:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind UDP sockets to all reserved ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ dontaudit $1 reserved_port_type:udp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to connect SCTP sockets
+## to all ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_sctp_connect_all_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_connect_all_ports'($*)) dnl
+
+ gen_require(`
+ attribute port_type;
+ ')
+
+ dontaudit $1 port_type:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_connect_all_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to all ports > 1024.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ allow $1 unreserved_port_type:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to all ports > 1024.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ allow $1 unreserved_port_type:udp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ allow $1 reserved_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect SCTP sockets to all ports > 1024.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_connect_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ allow $1 unreserved_port_type:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit connect attempts to TCP sockets on
+## ports greater than 1024.
+##
+##
+##
+## Domain not to audit access to.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_connect_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ dontaudit $1 unreserved_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to all ports > 1024.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ allow $1 unreserved_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to connect TCP sockets
+## all reserved ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_connect_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ dontaudit $1 reserved_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect TCP sockets to rpc ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ allow $1 rpc_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to connect TCP sockets
+## all rpc ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_connect_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_connect_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ dontaudit $1 rpc_port_type:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_connect_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_reserved_port'($*)) dnl
+
+ gen_require(`
+ type reserved_port_t;
+ ')
+
+ allow $1 reserved_port_t:sctp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the TUN/TAP virtual network device.
+##
+##
+##
+## The domain read allowed access.
+##
+##
+#
+ define(`corenet_read_tun_tap_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_read_tun_tap_dev'($*)) dnl
+
+ gen_require(`
+ type tun_tap_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tun_tap_device_t:chr_file read_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_read_tun_tap_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Write the TUN/TAP virtual network device.
+##
+##
+##
+## The domain allowed write access.
+##
+##
+#
+ define(`corenet_write_tun_tap_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_write_tun_tap_dev'($*)) dnl
+
+ gen_require(`
+ type tun_tap_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tun_tap_device_t:chr_file write_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_write_tun_tap_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the TUN/TAP virtual network device.
+##
+##
+##
+## The domain allowed access.
+##
+##
+#
+ define(`corenet_rw_tun_tap_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_rw_tun_tap_dev'($*)) dnl
+
+ gen_require(`
+ type tun_tap_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tun_tap_device_t:chr_file rw_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_rw_tun_tap_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect SCTP sockets to generic reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_connect_reserved_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_reserved_port'($*)) dnl
+
+ gen_require(`
+ type reserved_port_t;
+ ')
+
+ allow $1 reserved_port_t:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_reserved_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read or write the TUN/TAP
+## virtual network device.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_rw_tun_tap_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_rw_tun_tap_dev'($*)) dnl
+
+ gen_require(`
+ type tun_tap_device_t;
+ ')
+
+ dontaudit $1 tun_tap_device_t:chr_file { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_rw_tun_tap_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Getattr the point-to-point device.
+##
+##
+##
+## The domain allowed access.
+##
+##
+#
+ define(`corenet_getattr_ppp_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_getattr_ppp_dev'($*)) dnl
+
+ gen_require(`
+ type ppp_device_t;
+ ')
+
+ allow $1 ppp_device_t:chr_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_getattr_ppp_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the point-to-point device.
+##
+##
+##
+## The domain allowed access.
+##
+##
+#
+ define(`corenet_rw_ppp_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_rw_ppp_dev'($*)) dnl
+
+ gen_require(`
+ type ppp_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 ppp_device_t:chr_file rw_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_rw_ppp_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to all RPC ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_bind_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ allow $1 rpc_port_type:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind TCP sockets to all RPC ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_bind_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_bind_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ dontaudit $1 rpc_port_type:tcp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_bind_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to all RPC ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_bind_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ allow $1 rpc_port_type:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind UDP sockets to all RPC ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_bind_all_rpc_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_bind_all_rpc_ports'($*)) dnl
+
+ gen_require(`
+ attribute rpc_port_type;
+ ')
+
+ dontaudit $1 rpc_port_type:udp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_bind_all_rpc_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to all reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ allow $1 reserved_port_type:sctp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive TCP packets from a NetLabel connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ allow $1 netlabel_peer_t:peer recv;
+ allow $1 netlabel_peer_t:tcp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive TCP packets from an unlabled connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_unlabeled'($*)) dnl
+
+ kernel_tcp_recvfrom_unlabeled($1)
+ kernel_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to bind SCTP sockets to all reserved ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_sctp_bind_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_bind_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ dontaudit $1 reserved_port_type:sctp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_bind_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive TCP packets from a NetLabel
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ dontaudit $1 netlabel_peer_t:peer recv;
+ dontaudit $1 netlabel_peer_t:tcp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive TCP packets from an unlabeled
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_tcp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
+
+ kernel_dontaudit_tcp_recvfrom_unlabeled($1)
+ kernel_dontaudit_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_dontaudit_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP packets from a NetLabel connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ allow $1 netlabel_peer_t:peer recv;
+ allow $1 netlabel_peer_t:udp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP packets from an unlabeled connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_udp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_unlabeled'($*)) dnl
+
+ kernel_udp_recvfrom_unlabeled($1)
+ kernel_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind SCTP sockets to all ports > 1024.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_bind_all_unreserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_bind_all_unreserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute unreserved_port_type;
+ ')
+
+ allow $1 unreserved_port_type:sctp_socket name_bind;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_bind_all_unreserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP packets from a NetLabel
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ dontaudit $1 netlabel_peer_t:peer recv;
+ dontaudit $1 netlabel_peer_t:udp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP packets from an unlabeled
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_udp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
+
+ kernel_dontaudit_udp_recvfrom_unlabeled($1)
+ kernel_dontaudit_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_dontaudit_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive Raw IP packets from a NetLabel connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ allow $1 netlabel_peer_t:peer recv;
+ allow $1 netlabel_peer_t:rawip_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive Raw IP packets from an unlabeled connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_raw_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_unlabeled'($*)) dnl
+
+ kernel_raw_recvfrom_unlabeled($1)
+ kernel_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive Raw IP packets from a NetLabel
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_raw_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_raw_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ dontaudit $1 netlabel_peer_t:peer recv;
+ dontaudit $1 netlabel_peer_t:rawip_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_raw_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect SCTP sockets to reserved ports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_connect_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_connect_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ allow $1 reserved_port_type:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_connect_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive Raw IP packets from an unlabeled
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_raw_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
+
+ kernel_dontaudit_raw_recvfrom_unlabeled($1)
+ kernel_dontaudit_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_dontaudit_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive packets from an unlabeled connection.
+##
+##
+##
+## Allow the specified domain to receive packets from an
+## unlabeled connection. On machines that do not utilize
+## labeled networking, this will be required on all
+## networking domains. On machines tha do utilize
+## labeled networking, this will be required for any
+## networking domain that is allowed to receive
+## network traffic that does not have a label.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_all_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_unlabeled'($*)) dnl
+
+ kernel_tcp_recvfrom_unlabeled($1)
+ kernel_udp_recvfrom_unlabeled($1)
+ kernel_raw_recvfrom_unlabeled($1)
+ kernel_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive packets from a NetLabel connection.
+##
+##
+##
+## Allow the specified domain to receive NetLabel
+## network traffic, which utilizes the Commercial IP
+## Security Option (CIPSO) to set the MLS level
+## of the network packets. This is required for
+## all networking domains that receive NetLabel
+## network traffic.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_all_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ allow $1 netlabel_peer_t:peer recv;
+ allow $1 netlabel_peer_t:{ tcp_socket udp_socket rawip_socket } recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive packets from an unlabeled connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_dontaudit_all_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_all_recvfrom_unlabeled'($*)) dnl
+
+ kernel_dontaudit_tcp_recvfrom_unlabeled($1)
+ kernel_dontaudit_udp_recvfrom_unlabeled($1)
+ kernel_dontaudit_raw_recvfrom_unlabeled($1)
+ kernel_dontaudit_recvfrom_unlabeled_peer($1)
+
+ # XXX - at some point the oubound/send access check will be removed
+ # but for right now we need to keep this in place so as not to break
+ # older systems
+ kernel_dontaudit_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_all_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to connect SCTP sockets
+## all reserved ports.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_sctp_connect_all_reserved_ports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sctp_connect_all_reserved_ports'($*)) dnl
+
+ gen_require(`
+ attribute reserved_port_type;
+ ')
+
+ dontaudit $1 reserved_port_type:sctp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sctp_connect_all_reserved_ports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive packets from a NetLabel
+## connection.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`corenet_dontaudit_all_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_all_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ dontaudit $1 netlabel_peer_t:peer recv;
+ dontaudit $1 netlabel_peer_t:{ tcp_socket udp_socket rawip_socket } recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_all_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Rules for receiving labeled TCP packets.
+##
+##
+##
+## Rules for receiving labeled TCP packets.
+##
+##
+## Due to the nature of TCP, this is bidirectional.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Peer domain.
+##
+##
+#
+ define(`corenet_tcp_recvfrom_labeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_recvfrom_labeled'($*)) dnl
+
+ allow { $1 $2 } self:association sendto;
+ allow $1 $2:{ association tcp_socket } recvfrom;
+ allow $2 $1:{ association tcp_socket } recvfrom;
+
+ allow $1 $2:peer recv;
+ allow $2 $1:peer recv;
+
+ # allow receiving packets from MLS-only peers using NetLabel
+ corenet_tcp_recvfrom_netlabel($1)
+ corenet_tcp_recvfrom_netlabel($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_recvfrom_labeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Rules for receiving labeled UDP packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Peer domain.
+##
+##
+#
+ define(`corenet_udp_recvfrom_labeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_recvfrom_labeled'($*)) dnl
+
+ allow $2 self:association sendto;
+ allow $1 $2:{ association udp_socket } recvfrom;
+
+ allow $1 $2:peer recv;
+
+ # allow receiving packets from MLS-only peers using NetLabel
+ corenet_udp_recvfrom_netlabel($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_recvfrom_labeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Rules for receiving labeled raw IP packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Peer domain.
+##
+##
+#
+ define(`corenet_raw_recvfrom_labeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_recvfrom_labeled'($*)) dnl
+
+ allow $2 self:association sendto;
+ allow $1 $2:{ association rawip_socket } recvfrom;
+
+ allow $1 $2:peer recv;
+
+ # allow receiving packets from MLS-only peers using NetLabel
+ corenet_raw_recvfrom_netlabel($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_recvfrom_labeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Rules for receiving labeled packets via TCP, UDP and raw IP.
+##
+##
+##
+## Rules for receiving labeled packets via TCP, UDP and raw IP.
+##
+##
+## Due to the nature of TCP, the rules (for TCP
+## networking only) are bidirectional.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Peer domain.
+##
+##
+#
+ define(`corenet_all_recvfrom_labeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_all_recvfrom_labeled'($*)) dnl
+
+ corenet_sctp_recvfrom_labeled($1, $2)
+ corenet_tcp_recvfrom_labeled($1, $2)
+ corenet_udp_recvfrom_labeled($1, $2)
+ corenet_raw_recvfrom_labeled($1, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_all_recvfrom_labeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow specified type to set the context of
+## a SPD entry for labeled ipsec associations.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_setcontext_all_spds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_setcontext_all_spds'($*)) dnl
+
+ gen_require(`
+ attribute ipsec_spd_type;
+ ')
+
+ allow $1 ipsec_spd_type:association setcontext;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_setcontext_all_spds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_send_generic_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_generic_client_packets'($*)) dnl
+
+ gen_require(`
+ type client_packet_t;
+ ')
+
+ allow $1 client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_generic_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive generic client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_receive_generic_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_generic_client_packets'($*)) dnl
+
+ gen_require(`
+ type client_packet_t;
+ ')
+
+ allow $1 client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_generic_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive generic client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_generic_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_generic_client_packets'($*)) dnl
+
+ corenet_send_generic_client_packets($1)
+ corenet_receive_generic_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_generic_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to the generic client packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_generic_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_generic_client_packets'($*)) dnl
+
+ gen_require(`
+ type client_packet_t;
+ ')
+
+ allow $1 client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_generic_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send generic server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_send_generic_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_generic_server_packets'($*)) dnl
+
+ gen_require(`
+ type server_packet_t;
+ ')
+
+ allow $1 server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_generic_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive generic server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_receive_generic_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_generic_server_packets'($*)) dnl
+
+ gen_require(`
+ type server_packet_t;
+ ')
+
+ allow $1 server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_generic_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive generic server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_generic_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_generic_server_packets'($*)) dnl
+
+ corenet_send_generic_server_packets($1)
+ corenet_receive_generic_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_generic_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to the generic server packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_generic_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_generic_server_packets'($*)) dnl
+
+ gen_require(`
+ type server_packet_t;
+ ')
+
+ allow $1 server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_generic_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive unlabeled packets.
+##
+##
+##
+## Send and receive unlabeled packets.
+## These packets do not match any netfilter
+## SECMARK rules.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_unlabeled_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_unlabeled_packets'($*)) dnl
+
+ kernel_sendrecv_unlabeled_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_unlabeled_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send all client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_send_all_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_all_client_packets'($*)) dnl
+
+ gen_require(`
+ attribute client_packet_type;
+ ')
+
+ allow $1 client_packet_type:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_all_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive all client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_receive_all_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_all_client_packets'($*)) dnl
+
+ gen_require(`
+ attribute client_packet_type;
+ ')
+
+ allow $1 client_packet_type:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_all_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive all client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_all_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_client_packets'($*)) dnl
+
+ corenet_send_all_client_packets($1)
+ corenet_receive_all_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to any client packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_all_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_client_packets'($*)) dnl
+
+ gen_require(`
+ attribute client_packet_type;
+ ')
+
+ allow $1 client_packet_type:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send all server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_send_all_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_all_server_packets'($*)) dnl
+
+ gen_require(`
+ attribute server_packet_type;
+ ')
+
+ allow $1 server_packet_type:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_all_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive SCTP packets from a NetLabel connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_recvfrom_netlabel',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_netlabel'($*)) dnl
+
+ gen_require(`
+ type netlabel_peer_t;
+ ')
+
+ allow $1 netlabel_peer_t:peer recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_netlabel'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive all server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_receive_all_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_all_server_packets'($*)) dnl
+
+ gen_require(`
+ attribute server_packet_type;
+ ')
+
+ allow $1 server_packet_type:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_all_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive all server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_all_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_server_packets'($*)) dnl
+
+ corenet_send_all_server_packets($1)
+ corenet_receive_all_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to any server packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_all_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_server_packets'($*)) dnl
+
+ gen_require(`
+ attribute server_packet_type;
+ ')
+
+ allow $1 server_packet_type:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive SCTP packets from an unlabled connection.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sctp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ attribute corenet_unlabeled_type;
+ ')
+
+ kernel_recvfrom_unlabeled_peer($1)
+
+ typeattribute $1 corenet_unlabeled_type;
+ kernel_sendrecv_unlabeled_association($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send all packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_send_all_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_all_packets'($*)) dnl
+
+ gen_require(`
+ attribute packet_type;
+ ')
+
+ allow $1 packet_type:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_all_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive all packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_receive_all_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_all_packets'($*)) dnl
+
+ gen_require(`
+ attribute packet_type;
+ ')
+
+ allow $1 packet_type:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_all_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive all packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_sendrecv_all_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_all_packets'($*)) dnl
+
+ corenet_send_all_packets($1)
+ corenet_receive_all_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_all_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to any packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_all_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_all_packets'($*)) dnl
+
+ gen_require(`
+ attribute packet_type;
+ ')
+
+ allow $1 packet_type:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_all_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Access unlabeled infiniband pkeys.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_ib_access_unlabeled_pkeys',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_access_unlabeled_pkeys'($*)) dnl
+
+ kernel_ib_access_unlabeled_pkeys($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_access_unlabeled_pkeys'($*)) dnl
+ ')
+
+
+########################################
+##
+## Access all labeled infiniband pkeys.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_ib_access_all_pkeys',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_access_all_pkeys'($*)) dnl
+
+ gen_require(`
+ attribute ibpkey_type;
+ ')
+
+ allow $1 ibpkey_type:infiniband_pkey access;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_access_all_pkeys'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage subnets on all labeled Infiniband endports
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_ib_manage_subnet_all_endports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_manage_subnet_all_endports'($*)) dnl
+
+ gen_require(`
+ attribute ibendport_type;
+ ')
+
+ allow $1 ibendport_type:infiniband_endport manage_subnet;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_manage_subnet_all_endports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage subnet on all unlabeled Infiniband endports
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_ib_manage_subnet_unlabeled_endports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_ib_manage_subnet_unlabeled_endports'($*)) dnl
+
+ kernel_ib_manage_subnet_unlabeled_endports($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_ib_manage_subnet_unlabeled_endports'($*)) dnl
+ ')
+
+
+########################################
+##
+## Rules for receiving labeled SCTP packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Peer domain.
+##
+##
+#
+ define(`corenet_sctp_recvfrom_labeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sctp_recvfrom_labeled'($*)) dnl
+
+ allow { $1 $2 } self:association sendto;
+ allow $1 $2:association recvfrom;
+ allow $2 $1:association recvfrom;
+
+ allow $1 $2:peer recv;
+ allow $2 $1:peer recv;
+
+ # allow receiving packets from MLS-only peers using NetLabel
+ corenet_sctp_recvfrom_netlabel($1)
+ corenet_sctp_recvfrom_netlabel($2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sctp_recvfrom_labeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unconfined access to network objects.
+##
+##
+##
+## The domain allowed access.
+##
+##
+#
+ define(`corenet_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_unconfined'($*)) dnl
+
+ gen_require(`
+ attribute corenet_unconfined_type;
+ ')
+
+ typeattribute $1 corenet_unconfined_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_unconfined'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the adb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the adb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the adb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_adb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_adb_port'($*)) dnl
+
+ gen_require(`
+ type adb_port_t;
+ ')
+
+ allow $1 adb_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_adb_port'($*)) dnl
+
+ gen_require(`
+ type adb_port_t;
+ ')
+
+ allow $1 adb_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_adb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the adb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_adb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_adb_port'($*)) dnl
+
+ gen_require(`
+ type adb_port_t;
+ ')
+
+ allow $1 adb_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_adb_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send adb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_adb_client_packets'($*)) dnl
+
+ gen_require(`
+ type adb_client_packet_t;
+ ')
+
+ allow $1 adb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send adb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_adb_client_packets'($*)) dnl
+
+ gen_require(`
+ type adb_client_packet_t;
+ ')
+
+ dontaudit $1 adb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive adb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_adb_client_packets'($*)) dnl
+
+ gen_require(`
+ type adb_client_packet_t;
+ ')
+
+ allow $1 adb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive adb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_adb_client_packets'($*)) dnl
+
+ gen_require(`
+ type adb_client_packet_t;
+ ')
+
+ dontaudit $1 adb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive adb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_adb_client_packets'($*)) dnl
+
+ corenet_send_adb_client_packets($1)
+ corenet_receive_adb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive adb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_adb_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_adb_client_packets($1)
+ corenet_dontaudit_receive_adb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_adb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to adb_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_adb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_adb_client_packets'($*)) dnl
+
+ gen_require(`
+ type adb_client_packet_t;
+ ')
+
+ allow $1 adb_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_adb_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send adb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_adb_server_packets'($*)) dnl
+
+ gen_require(`
+ type adb_server_packet_t;
+ ')
+
+ allow $1 adb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send adb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_adb_server_packets'($*)) dnl
+
+ gen_require(`
+ type adb_server_packet_t;
+ ')
+
+ dontaudit $1 adb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive adb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_adb_server_packets'($*)) dnl
+
+ gen_require(`
+ type adb_server_packet_t;
+ ')
+
+ allow $1 adb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive adb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_adb_server_packets'($*)) dnl
+
+ gen_require(`
+ type adb_server_packet_t;
+ ')
+
+ dontaudit $1 adb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive adb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_adb_server_packets'($*)) dnl
+
+ corenet_send_adb_server_packets($1)
+ corenet_receive_adb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive adb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_adb_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_adb_server_packets($1)
+ corenet_dontaudit_receive_adb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_adb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to adb_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_adb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_adb_server_packets'($*)) dnl
+
+ gen_require(`
+ type adb_server_packet_t;
+ ')
+
+ allow $1 adb_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_adb_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs_bos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_bos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_bos_port'($*)) dnl
+
+ gen_require(`
+ type afs_bos_port_t;
+ ')
+
+ allow $1 afs_bos_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_bos_port'($*)) dnl
+
+ gen_require(`
+ type afs_bos_port_t;
+ ')
+
+ allow $1 afs_bos_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_bos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs_bos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs_bos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_bos_port'($*)) dnl
+
+ gen_require(`
+ type afs_bos_port_t;
+ ')
+
+ allow $1 afs_bos_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_bos_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_bos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_bos_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_client_packet_t;
+ ')
+
+ allow $1 afs_bos_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_bos_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_bos_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_client_packet_t;
+ ')
+
+ dontaudit $1 afs_bos_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_bos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_bos_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_client_packet_t;
+ ')
+
+ allow $1 afs_bos_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_bos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_bos_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_client_packet_t;
+ ')
+
+ dontaudit $1 afs_bos_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_bos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_bos_client_packets'($*)) dnl
+
+ corenet_send_afs_bos_client_packets($1)
+ corenet_receive_afs_bos_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_bos_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_bos_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_bos_client_packets($1)
+ corenet_dontaudit_receive_afs_bos_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_bos_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_bos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_bos_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_client_packet_t;
+ ')
+
+ allow $1 afs_bos_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_bos_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_bos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_bos_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_server_packet_t;
+ ')
+
+ allow $1 afs_bos_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_bos_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_bos_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_server_packet_t;
+ ')
+
+ dontaudit $1 afs_bos_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_bos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_bos_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_server_packet_t;
+ ')
+
+ allow $1 afs_bos_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_bos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_bos_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_server_packet_t;
+ ')
+
+ dontaudit $1 afs_bos_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_bos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_bos_server_packets'($*)) dnl
+
+ corenet_send_afs_bos_server_packets($1)
+ corenet_receive_afs_bos_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_bos_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_bos_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_bos_server_packets($1)
+ corenet_dontaudit_receive_afs_bos_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_bos_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_bos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_bos_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_bos_server_packet_t;
+ ')
+
+ allow $1 afs_bos_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_bos_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs_fs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_fs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_fs_port'($*)) dnl
+
+ gen_require(`
+ type afs_fs_port_t;
+ ')
+
+ allow $1 afs_fs_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_fs_port'($*)) dnl
+
+ gen_require(`
+ type afs_fs_port_t;
+ ')
+
+ allow $1 afs_fs_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_fs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs_fs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs_fs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_fs_port'($*)) dnl
+
+ gen_require(`
+ type afs_fs_port_t;
+ ')
+
+ allow $1 afs_fs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_fs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_fs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_fs_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_client_packet_t;
+ ')
+
+ allow $1 afs_fs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_fs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_fs_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_client_packet_t;
+ ')
+
+ dontaudit $1 afs_fs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_fs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_fs_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_client_packet_t;
+ ')
+
+ allow $1 afs_fs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_fs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_fs_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_client_packet_t;
+ ')
+
+ dontaudit $1 afs_fs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_fs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_fs_client_packets'($*)) dnl
+
+ corenet_send_afs_fs_client_packets($1)
+ corenet_receive_afs_fs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_fs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_fs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_fs_client_packets($1)
+ corenet_dontaudit_receive_afs_fs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_fs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_fs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_fs_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_client_packet_t;
+ ')
+
+ allow $1 afs_fs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_fs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_fs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_fs_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_server_packet_t;
+ ')
+
+ allow $1 afs_fs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_fs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_fs_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_server_packet_t;
+ ')
+
+ dontaudit $1 afs_fs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_fs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_fs_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_server_packet_t;
+ ')
+
+ allow $1 afs_fs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_fs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_fs_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_server_packet_t;
+ ')
+
+ dontaudit $1 afs_fs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_fs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_fs_server_packets'($*)) dnl
+
+ corenet_send_afs_fs_server_packets($1)
+ corenet_receive_afs_fs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_fs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_fs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_fs_server_packets($1)
+ corenet_dontaudit_receive_afs_fs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_fs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_fs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_fs_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_fs_server_packet_t;
+ ')
+
+ allow $1 afs_fs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_fs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs_ka port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_ka_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_ka_port'($*)) dnl
+
+ gen_require(`
+ type afs_ka_port_t;
+ ')
+
+ allow $1 afs_ka_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_ka_port'($*)) dnl
+
+ gen_require(`
+ type afs_ka_port_t;
+ ')
+
+ allow $1 afs_ka_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_ka_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs_ka port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs_ka_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_ka_port'($*)) dnl
+
+ gen_require(`
+ type afs_ka_port_t;
+ ')
+
+ allow $1 afs_ka_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_ka_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_ka_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_ka_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_client_packet_t;
+ ')
+
+ allow $1 afs_ka_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_ka_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_ka_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_client_packet_t;
+ ')
+
+ dontaudit $1 afs_ka_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_ka_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_ka_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_client_packet_t;
+ ')
+
+ allow $1 afs_ka_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_ka_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_ka_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_client_packet_t;
+ ')
+
+ dontaudit $1 afs_ka_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_ka_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_ka_client_packets'($*)) dnl
+
+ corenet_send_afs_ka_client_packets($1)
+ corenet_receive_afs_ka_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_ka_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_ka_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_ka_client_packets($1)
+ corenet_dontaudit_receive_afs_ka_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_ka_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_ka_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_ka_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_client_packet_t;
+ ')
+
+ allow $1 afs_ka_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_ka_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_ka_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_ka_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_server_packet_t;
+ ')
+
+ allow $1 afs_ka_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_ka_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_ka_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_server_packet_t;
+ ')
+
+ dontaudit $1 afs_ka_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_ka_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_ka_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_server_packet_t;
+ ')
+
+ allow $1 afs_ka_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_ka_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_ka_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_server_packet_t;
+ ')
+
+ dontaudit $1 afs_ka_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_ka_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_ka_server_packets'($*)) dnl
+
+ corenet_send_afs_ka_server_packets($1)
+ corenet_receive_afs_ka_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_ka_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_ka_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_ka_server_packets($1)
+ corenet_dontaudit_receive_afs_ka_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_ka_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_ka_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_ka_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_ka_server_packet_t;
+ ')
+
+ allow $1 afs_ka_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_ka_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs_pt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_pt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_pt_port'($*)) dnl
+
+ gen_require(`
+ type afs_pt_port_t;
+ ')
+
+ allow $1 afs_pt_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_pt_port'($*)) dnl
+
+ gen_require(`
+ type afs_pt_port_t;
+ ')
+
+ allow $1 afs_pt_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_pt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs_pt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs_pt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_pt_port'($*)) dnl
+
+ gen_require(`
+ type afs_pt_port_t;
+ ')
+
+ allow $1 afs_pt_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_pt_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_pt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_pt_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_client_packet_t;
+ ')
+
+ allow $1 afs_pt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_pt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_pt_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_client_packet_t;
+ ')
+
+ dontaudit $1 afs_pt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_pt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_pt_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_client_packet_t;
+ ')
+
+ allow $1 afs_pt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_pt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_pt_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_client_packet_t;
+ ')
+
+ dontaudit $1 afs_pt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_pt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_pt_client_packets'($*)) dnl
+
+ corenet_send_afs_pt_client_packets($1)
+ corenet_receive_afs_pt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_pt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_pt_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_pt_client_packets($1)
+ corenet_dontaudit_receive_afs_pt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_pt_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_pt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_pt_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_client_packet_t;
+ ')
+
+ allow $1 afs_pt_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_pt_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_pt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_pt_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_server_packet_t;
+ ')
+
+ allow $1 afs_pt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_pt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_pt_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_server_packet_t;
+ ')
+
+ dontaudit $1 afs_pt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_pt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_pt_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_server_packet_t;
+ ')
+
+ allow $1 afs_pt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_pt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_pt_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_server_packet_t;
+ ')
+
+ dontaudit $1 afs_pt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_pt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_pt_server_packets'($*)) dnl
+
+ corenet_send_afs_pt_server_packets($1)
+ corenet_receive_afs_pt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_pt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_pt_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_pt_server_packets($1)
+ corenet_dontaudit_receive_afs_pt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_pt_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_pt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_pt_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_pt_server_packet_t;
+ ')
+
+ allow $1 afs_pt_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_pt_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs_vl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs_vl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs_vl_port'($*)) dnl
+
+ gen_require(`
+ type afs_vl_port_t;
+ ')
+
+ allow $1 afs_vl_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs_vl_port'($*)) dnl
+
+ gen_require(`
+ type afs_vl_port_t;
+ ')
+
+ allow $1 afs_vl_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs_vl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs_vl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs_vl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs_vl_port'($*)) dnl
+
+ gen_require(`
+ type afs_vl_port_t;
+ ')
+
+ allow $1 afs_vl_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs_vl_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_vl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_vl_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_client_packet_t;
+ ')
+
+ allow $1 afs_vl_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_vl_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_vl_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_client_packet_t;
+ ')
+
+ dontaudit $1 afs_vl_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_vl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_vl_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_client_packet_t;
+ ')
+
+ allow $1 afs_vl_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_vl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_vl_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_client_packet_t;
+ ')
+
+ dontaudit $1 afs_vl_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_vl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_vl_client_packets'($*)) dnl
+
+ corenet_send_afs_vl_client_packets($1)
+ corenet_receive_afs_vl_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_vl_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_vl_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_vl_client_packets($1)
+ corenet_dontaudit_receive_afs_vl_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_vl_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_vl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_vl_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_client_packet_t;
+ ')
+
+ allow $1 afs_vl_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_vl_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs_vl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs_vl_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_server_packet_t;
+ ')
+
+ allow $1 afs_vl_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs_vl_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs_vl_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_server_packet_t;
+ ')
+
+ dontaudit $1 afs_vl_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs_vl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs_vl_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_server_packet_t;
+ ')
+
+ allow $1 afs_vl_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs_vl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs_vl_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_server_packet_t;
+ ')
+
+ dontaudit $1 afs_vl_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs_vl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs_vl_server_packets'($*)) dnl
+
+ corenet_send_afs_vl_server_packets($1)
+ corenet_receive_afs_vl_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs_vl_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs_vl_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs_vl_server_packets($1)
+ corenet_dontaudit_receive_afs_vl_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs_vl_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs_vl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs_vl_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs_vl_server_packet_t;
+ ')
+
+ allow $1 afs_vl_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs_vl_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the afs3_callback port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_afs3_callback_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_afs3_callback_port'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_port_t;
+ ')
+
+ allow $1 afs3_callback_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_afs3_callback_port'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_port_t;
+ ')
+
+ allow $1 afs3_callback_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_afs3_callback_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the afs3_callback port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_afs3_callback_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_afs3_callback_port'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_port_t;
+ ')
+
+ allow $1 afs3_callback_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_afs3_callback_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs3_callback_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs3_callback_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_client_packet_t;
+ ')
+
+ allow $1 afs3_callback_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs3_callback_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs3_callback_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_client_packet_t;
+ ')
+
+ dontaudit $1 afs3_callback_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs3_callback_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs3_callback_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_client_packet_t;
+ ')
+
+ allow $1 afs3_callback_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs3_callback_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs3_callback_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_client_packet_t;
+ ')
+
+ dontaudit $1 afs3_callback_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs3_callback_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs3_callback_client_packets'($*)) dnl
+
+ corenet_send_afs3_callback_client_packets($1)
+ corenet_receive_afs3_callback_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs3_callback_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs3_callback_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs3_callback_client_packets($1)
+ corenet_dontaudit_receive_afs3_callback_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs3_callback_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs3_callback_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs3_callback_client_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_client_packet_t;
+ ')
+
+ allow $1 afs3_callback_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs3_callback_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send afs3_callback_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_afs3_callback_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_server_packet_t;
+ ')
+
+ allow $1 afs3_callback_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send afs3_callback_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_afs3_callback_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_server_packet_t;
+ ')
+
+ dontaudit $1 afs3_callback_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive afs3_callback_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_afs3_callback_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_server_packet_t;
+ ')
+
+ allow $1 afs3_callback_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive afs3_callback_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_afs3_callback_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_server_packet_t;
+ ')
+
+ dontaudit $1 afs3_callback_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive afs3_callback_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_afs3_callback_server_packets'($*)) dnl
+
+ corenet_send_afs3_callback_server_packets($1)
+ corenet_receive_afs3_callback_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive afs3_callback_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_afs3_callback_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_afs3_callback_server_packets($1)
+ corenet_dontaudit_receive_afs3_callback_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to afs3_callback_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_afs3_callback_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_afs3_callback_server_packets'($*)) dnl
+
+ gen_require(`
+ type afs3_callback_server_packet_t;
+ ')
+
+ allow $1 afs3_callback_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_afs3_callback_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the agentx port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the agentx port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the agentx port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_agentx_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_agentx_port'($*)) dnl
+
+ gen_require(`
+ type agentx_port_t;
+ ')
+
+ allow $1 agentx_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_agentx_port'($*)) dnl
+
+ gen_require(`
+ type agentx_port_t;
+ ')
+
+ allow $1 agentx_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_agentx_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the agentx port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_agentx_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_agentx_port'($*)) dnl
+
+ gen_require(`
+ type agentx_port_t;
+ ')
+
+ allow $1 agentx_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_agentx_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send agentx_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_agentx_client_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_client_packet_t;
+ ')
+
+ allow $1 agentx_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send agentx_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_agentx_client_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_client_packet_t;
+ ')
+
+ dontaudit $1 agentx_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive agentx_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_agentx_client_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_client_packet_t;
+ ')
+
+ allow $1 agentx_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive agentx_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_agentx_client_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_client_packet_t;
+ ')
+
+ dontaudit $1 agentx_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive agentx_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_agentx_client_packets'($*)) dnl
+
+ corenet_send_agentx_client_packets($1)
+ corenet_receive_agentx_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive agentx_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_agentx_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_agentx_client_packets($1)
+ corenet_dontaudit_receive_agentx_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_agentx_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to agentx_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_agentx_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_agentx_client_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_client_packet_t;
+ ')
+
+ allow $1 agentx_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_agentx_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send agentx_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_agentx_server_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_server_packet_t;
+ ')
+
+ allow $1 agentx_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send agentx_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_agentx_server_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_server_packet_t;
+ ')
+
+ dontaudit $1 agentx_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive agentx_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_agentx_server_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_server_packet_t;
+ ')
+
+ allow $1 agentx_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive agentx_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_agentx_server_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_server_packet_t;
+ ')
+
+ dontaudit $1 agentx_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive agentx_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_agentx_server_packets'($*)) dnl
+
+ corenet_send_agentx_server_packets($1)
+ corenet_receive_agentx_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive agentx_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_agentx_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_agentx_server_packets($1)
+ corenet_dontaudit_receive_agentx_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_agentx_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to agentx_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_agentx_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_agentx_server_packets'($*)) dnl
+
+ gen_require(`
+ type agentx_server_packet_t;
+ ')
+
+ allow $1 agentx_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_agentx_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the amanda port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the amanda port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the amanda port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amanda_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amanda_port'($*)) dnl
+
+ gen_require(`
+ type amanda_port_t;
+ ')
+
+ allow $1 amanda_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amanda_port'($*)) dnl
+
+ gen_require(`
+ type amanda_port_t;
+ ')
+
+ allow $1 amanda_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amanda_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the amanda port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_amanda_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amanda_port'($*)) dnl
+
+ gen_require(`
+ type amanda_port_t;
+ ')
+
+ allow $1 amanda_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amanda_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amanda_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amanda_client_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_client_packet_t;
+ ')
+
+ allow $1 amanda_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amanda_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amanda_client_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_client_packet_t;
+ ')
+
+ dontaudit $1 amanda_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amanda_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amanda_client_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_client_packet_t;
+ ')
+
+ allow $1 amanda_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amanda_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amanda_client_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_client_packet_t;
+ ')
+
+ dontaudit $1 amanda_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amanda_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amanda_client_packets'($*)) dnl
+
+ corenet_send_amanda_client_packets($1)
+ corenet_receive_amanda_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amanda_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amanda_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_amanda_client_packets($1)
+ corenet_dontaudit_receive_amanda_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amanda_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amanda_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amanda_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amanda_client_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_client_packet_t;
+ ')
+
+ allow $1 amanda_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amanda_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amanda_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amanda_server_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_server_packet_t;
+ ')
+
+ allow $1 amanda_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amanda_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amanda_server_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_server_packet_t;
+ ')
+
+ dontaudit $1 amanda_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amanda_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amanda_server_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_server_packet_t;
+ ')
+
+ allow $1 amanda_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amanda_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amanda_server_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_server_packet_t;
+ ')
+
+ dontaudit $1 amanda_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amanda_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amanda_server_packets'($*)) dnl
+
+ corenet_send_amanda_server_packets($1)
+ corenet_receive_amanda_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amanda_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amanda_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_amanda_server_packets($1)
+ corenet_dontaudit_receive_amanda_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amanda_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amanda_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amanda_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amanda_server_packets'($*)) dnl
+
+ gen_require(`
+ type amanda_server_packet_t;
+ ')
+
+ allow $1 amanda_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amanda_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the amavisd_recv port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amavisd_recv_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amavisd_recv_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_port_t;
+ ')
+
+ allow $1 amavisd_recv_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amavisd_recv_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_port_t;
+ ')
+
+ allow $1 amavisd_recv_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amavisd_recv_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the amavisd_recv port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_amavisd_recv_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amavisd_recv_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_port_t;
+ ')
+
+ allow $1 amavisd_recv_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amavisd_recv_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amavisd_recv_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_recv_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_client_packet_t;
+ ')
+
+ allow $1 amavisd_recv_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amavisd_recv_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_recv_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_client_packet_t;
+ ')
+
+ dontaudit $1 amavisd_recv_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amavisd_recv_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_recv_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_client_packet_t;
+ ')
+
+ allow $1 amavisd_recv_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amavisd_recv_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_recv_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_client_packet_t;
+ ')
+
+ dontaudit $1 amavisd_recv_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amavisd_recv_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_recv_client_packets'($*)) dnl
+
+ corenet_send_amavisd_recv_client_packets($1)
+ corenet_receive_amavisd_recv_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amavisd_recv_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_recv_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_amavisd_recv_client_packets($1)
+ corenet_dontaudit_receive_amavisd_recv_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amavisd_recv_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amavisd_recv_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_recv_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_client_packet_t;
+ ')
+
+ allow $1 amavisd_recv_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_recv_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amavisd_recv_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_recv_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_server_packet_t;
+ ')
+
+ allow $1 amavisd_recv_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amavisd_recv_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_recv_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_server_packet_t;
+ ')
+
+ dontaudit $1 amavisd_recv_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amavisd_recv_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_recv_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_server_packet_t;
+ ')
+
+ allow $1 amavisd_recv_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amavisd_recv_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_recv_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_server_packet_t;
+ ')
+
+ dontaudit $1 amavisd_recv_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amavisd_recv_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_recv_server_packets'($*)) dnl
+
+ corenet_send_amavisd_recv_server_packets($1)
+ corenet_receive_amavisd_recv_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amavisd_recv_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_recv_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_amavisd_recv_server_packets($1)
+ corenet_dontaudit_receive_amavisd_recv_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amavisd_recv_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amavisd_recv_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_recv_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_recv_server_packet_t;
+ ')
+
+ allow $1 amavisd_recv_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_recv_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the amavisd_send port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amavisd_send_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amavisd_send_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_port_t;
+ ')
+
+ allow $1 amavisd_send_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amavisd_send_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_port_t;
+ ')
+
+ allow $1 amavisd_send_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amavisd_send_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the amavisd_send port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_amavisd_send_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amavisd_send_port'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_port_t;
+ ')
+
+ allow $1 amavisd_send_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amavisd_send_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amavisd_send_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_send_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_client_packet_t;
+ ')
+
+ allow $1 amavisd_send_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amavisd_send_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_send_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_client_packet_t;
+ ')
+
+ dontaudit $1 amavisd_send_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amavisd_send_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_send_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_client_packet_t;
+ ')
+
+ allow $1 amavisd_send_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amavisd_send_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_send_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_client_packet_t;
+ ')
+
+ dontaudit $1 amavisd_send_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amavisd_send_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_send_client_packets'($*)) dnl
+
+ corenet_send_amavisd_send_client_packets($1)
+ corenet_receive_amavisd_send_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amavisd_send_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_send_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_amavisd_send_client_packets($1)
+ corenet_dontaudit_receive_amavisd_send_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amavisd_send_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amavisd_send_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_send_client_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_client_packet_t;
+ ')
+
+ allow $1 amavisd_send_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_send_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amavisd_send_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amavisd_send_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_server_packet_t;
+ ')
+
+ allow $1 amavisd_send_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amavisd_send_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amavisd_send_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_server_packet_t;
+ ')
+
+ dontaudit $1 amavisd_send_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amavisd_send_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amavisd_send_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_server_packet_t;
+ ')
+
+ allow $1 amavisd_send_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amavisd_send_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amavisd_send_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_server_packet_t;
+ ')
+
+ dontaudit $1 amavisd_send_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amavisd_send_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amavisd_send_server_packets'($*)) dnl
+
+ corenet_send_amavisd_send_server_packets($1)
+ corenet_receive_amavisd_send_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amavisd_send_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amavisd_send_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_amavisd_send_server_packets($1)
+ corenet_dontaudit_receive_amavisd_send_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amavisd_send_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amavisd_send_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amavisd_send_server_packets'($*)) dnl
+
+ gen_require(`
+ type amavisd_send_server_packet_t;
+ ')
+
+ allow $1 amavisd_send_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amavisd_send_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the amqp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the amqp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the amqp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_amqp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_amqp_port'($*)) dnl
+
+ gen_require(`
+ type amqp_port_t;
+ ')
+
+ allow $1 amqp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_amqp_port'($*)) dnl
+
+ gen_require(`
+ type amqp_port_t;
+ ')
+
+ allow $1 amqp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_amqp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the amqp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_amqp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_amqp_port'($*)) dnl
+
+ gen_require(`
+ type amqp_port_t;
+ ')
+
+ allow $1 amqp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_amqp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amqp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amqp_client_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_client_packet_t;
+ ')
+
+ allow $1 amqp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amqp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amqp_client_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_client_packet_t;
+ ')
+
+ dontaudit $1 amqp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amqp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amqp_client_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_client_packet_t;
+ ')
+
+ allow $1 amqp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amqp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amqp_client_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_client_packet_t;
+ ')
+
+ dontaudit $1 amqp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amqp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amqp_client_packets'($*)) dnl
+
+ corenet_send_amqp_client_packets($1)
+ corenet_receive_amqp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amqp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amqp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_amqp_client_packets($1)
+ corenet_dontaudit_receive_amqp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amqp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amqp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amqp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amqp_client_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_client_packet_t;
+ ')
+
+ allow $1 amqp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amqp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send amqp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_amqp_server_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_server_packet_t;
+ ')
+
+ allow $1 amqp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send amqp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_amqp_server_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_server_packet_t;
+ ')
+
+ dontaudit $1 amqp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive amqp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_amqp_server_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_server_packet_t;
+ ')
+
+ allow $1 amqp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive amqp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_amqp_server_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_server_packet_t;
+ ')
+
+ dontaudit $1 amqp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive amqp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_amqp_server_packets'($*)) dnl
+
+ corenet_send_amqp_server_packets($1)
+ corenet_receive_amqp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive amqp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_amqp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_amqp_server_packets($1)
+ corenet_dontaudit_receive_amqp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_amqp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to amqp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_amqp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_amqp_server_packets'($*)) dnl
+
+ gen_require(`
+ type amqp_server_packet_t;
+ ')
+
+ allow $1 amqp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_amqp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the aol port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the aol port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the aol port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_aol_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_aol_port'($*)) dnl
+
+ gen_require(`
+ type aol_port_t;
+ ')
+
+ allow $1 aol_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_aol_port'($*)) dnl
+
+ gen_require(`
+ type aol_port_t;
+ ')
+
+ allow $1 aol_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_aol_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the aol port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_aol_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_aol_port'($*)) dnl
+
+ gen_require(`
+ type aol_port_t;
+ ')
+
+ allow $1 aol_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_aol_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send aol_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_aol_client_packets'($*)) dnl
+
+ gen_require(`
+ type aol_client_packet_t;
+ ')
+
+ allow $1 aol_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send aol_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_aol_client_packets'($*)) dnl
+
+ gen_require(`
+ type aol_client_packet_t;
+ ')
+
+ dontaudit $1 aol_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive aol_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_aol_client_packets'($*)) dnl
+
+ gen_require(`
+ type aol_client_packet_t;
+ ')
+
+ allow $1 aol_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive aol_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_aol_client_packets'($*)) dnl
+
+ gen_require(`
+ type aol_client_packet_t;
+ ')
+
+ dontaudit $1 aol_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive aol_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_aol_client_packets'($*)) dnl
+
+ corenet_send_aol_client_packets($1)
+ corenet_receive_aol_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive aol_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_aol_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_aol_client_packets($1)
+ corenet_dontaudit_receive_aol_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_aol_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to aol_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_aol_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_aol_client_packets'($*)) dnl
+
+ gen_require(`
+ type aol_client_packet_t;
+ ')
+
+ allow $1 aol_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_aol_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send aol_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_aol_server_packets'($*)) dnl
+
+ gen_require(`
+ type aol_server_packet_t;
+ ')
+
+ allow $1 aol_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send aol_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_aol_server_packets'($*)) dnl
+
+ gen_require(`
+ type aol_server_packet_t;
+ ')
+
+ dontaudit $1 aol_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive aol_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_aol_server_packets'($*)) dnl
+
+ gen_require(`
+ type aol_server_packet_t;
+ ')
+
+ allow $1 aol_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive aol_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_aol_server_packets'($*)) dnl
+
+ gen_require(`
+ type aol_server_packet_t;
+ ')
+
+ dontaudit $1 aol_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive aol_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_aol_server_packets'($*)) dnl
+
+ corenet_send_aol_server_packets($1)
+ corenet_receive_aol_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive aol_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_aol_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_aol_server_packets($1)
+ corenet_dontaudit_receive_aol_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_aol_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to aol_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_aol_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_aol_server_packets'($*)) dnl
+
+ gen_require(`
+ type aol_server_packet_t;
+ ')
+
+ allow $1 aol_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_aol_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the apcupsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_apcupsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_apcupsd_port'($*)) dnl
+
+ gen_require(`
+ type apcupsd_port_t;
+ ')
+
+ allow $1 apcupsd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_apcupsd_port'($*)) dnl
+
+ gen_require(`
+ type apcupsd_port_t;
+ ')
+
+ allow $1 apcupsd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_apcupsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the apcupsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_apcupsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_apcupsd_port'($*)) dnl
+
+ gen_require(`
+ type apcupsd_port_t;
+ ')
+
+ allow $1 apcupsd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_apcupsd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send apcupsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_apcupsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_client_packet_t;
+ ')
+
+ allow $1 apcupsd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send apcupsd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apcupsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_client_packet_t;
+ ')
+
+ dontaudit $1 apcupsd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive apcupsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_apcupsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_client_packet_t;
+ ')
+
+ allow $1 apcupsd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive apcupsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apcupsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_client_packet_t;
+ ')
+
+ dontaudit $1 apcupsd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive apcupsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apcupsd_client_packets'($*)) dnl
+
+ corenet_send_apcupsd_client_packets($1)
+ corenet_receive_apcupsd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive apcupsd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apcupsd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_apcupsd_client_packets($1)
+ corenet_dontaudit_receive_apcupsd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to apcupsd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_apcupsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apcupsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_client_packet_t;
+ ')
+
+ allow $1 apcupsd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_apcupsd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send apcupsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_apcupsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_server_packet_t;
+ ')
+
+ allow $1 apcupsd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send apcupsd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apcupsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_server_packet_t;
+ ')
+
+ dontaudit $1 apcupsd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive apcupsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_apcupsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_server_packet_t;
+ ')
+
+ allow $1 apcupsd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive apcupsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apcupsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_server_packet_t;
+ ')
+
+ dontaudit $1 apcupsd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive apcupsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apcupsd_server_packets'($*)) dnl
+
+ corenet_send_apcupsd_server_packets($1)
+ corenet_receive_apcupsd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive apcupsd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apcupsd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_apcupsd_server_packets($1)
+ corenet_dontaudit_receive_apcupsd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to apcupsd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_apcupsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apcupsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type apcupsd_server_packet_t;
+ ')
+
+ allow $1 apcupsd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_apcupsd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the apertus_ldp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_apertus_ldp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_apertus_ldp_port'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_port_t;
+ ')
+
+ allow $1 apertus_ldp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_apertus_ldp_port'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_port_t;
+ ')
+
+ allow $1 apertus_ldp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_apertus_ldp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the apertus_ldp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_apertus_ldp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_apertus_ldp_port'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_port_t;
+ ')
+
+ allow $1 apertus_ldp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_apertus_ldp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send apertus_ldp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_apertus_ldp_client_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_client_packet_t;
+ ')
+
+ allow $1 apertus_ldp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send apertus_ldp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apertus_ldp_client_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_client_packet_t;
+ ')
+
+ dontaudit $1 apertus_ldp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive apertus_ldp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_apertus_ldp_client_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_client_packet_t;
+ ')
+
+ allow $1 apertus_ldp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive apertus_ldp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apertus_ldp_client_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_client_packet_t;
+ ')
+
+ dontaudit $1 apertus_ldp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive apertus_ldp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apertus_ldp_client_packets'($*)) dnl
+
+ corenet_send_apertus_ldp_client_packets($1)
+ corenet_receive_apertus_ldp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive apertus_ldp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apertus_ldp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_apertus_ldp_client_packets($1)
+ corenet_dontaudit_receive_apertus_ldp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to apertus_ldp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_apertus_ldp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apertus_ldp_client_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_client_packet_t;
+ ')
+
+ allow $1 apertus_ldp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_apertus_ldp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send apertus_ldp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_apertus_ldp_server_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_server_packet_t;
+ ')
+
+ allow $1 apertus_ldp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send apertus_ldp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_apertus_ldp_server_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_server_packet_t;
+ ')
+
+ dontaudit $1 apertus_ldp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive apertus_ldp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_apertus_ldp_server_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_server_packet_t;
+ ')
+
+ allow $1 apertus_ldp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive apertus_ldp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_apertus_ldp_server_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_server_packet_t;
+ ')
+
+ dontaudit $1 apertus_ldp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive apertus_ldp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_apertus_ldp_server_packets'($*)) dnl
+
+ corenet_send_apertus_ldp_server_packets($1)
+ corenet_receive_apertus_ldp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive apertus_ldp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_apertus_ldp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_apertus_ldp_server_packets($1)
+ corenet_dontaudit_receive_apertus_ldp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to apertus_ldp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_apertus_ldp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_apertus_ldp_server_packets'($*)) dnl
+
+ gen_require(`
+ type apertus_ldp_server_packet_t;
+ ')
+
+ allow $1 apertus_ldp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_apertus_ldp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the armtechdaemon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_armtechdaemon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_armtechdaemon_port'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_port_t;
+ ')
+
+ allow $1 armtechdaemon_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_armtechdaemon_port'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_port_t;
+ ')
+
+ allow $1 armtechdaemon_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_armtechdaemon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the armtechdaemon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_armtechdaemon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_armtechdaemon_port'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_port_t;
+ ')
+
+ allow $1 armtechdaemon_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_armtechdaemon_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send armtechdaemon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_armtechdaemon_client_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_client_packet_t;
+ ')
+
+ allow $1 armtechdaemon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send armtechdaemon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_armtechdaemon_client_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_client_packet_t;
+ ')
+
+ dontaudit $1 armtechdaemon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive armtechdaemon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_armtechdaemon_client_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_client_packet_t;
+ ')
+
+ allow $1 armtechdaemon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive armtechdaemon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_armtechdaemon_client_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_client_packet_t;
+ ')
+
+ dontaudit $1 armtechdaemon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive armtechdaemon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_armtechdaemon_client_packets'($*)) dnl
+
+ corenet_send_armtechdaemon_client_packets($1)
+ corenet_receive_armtechdaemon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive armtechdaemon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_armtechdaemon_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_armtechdaemon_client_packets($1)
+ corenet_dontaudit_receive_armtechdaemon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to armtechdaemon_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_armtechdaemon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_armtechdaemon_client_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_client_packet_t;
+ ')
+
+ allow $1 armtechdaemon_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_armtechdaemon_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send armtechdaemon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_armtechdaemon_server_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_server_packet_t;
+ ')
+
+ allow $1 armtechdaemon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send armtechdaemon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_armtechdaemon_server_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_server_packet_t;
+ ')
+
+ dontaudit $1 armtechdaemon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive armtechdaemon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_armtechdaemon_server_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_server_packet_t;
+ ')
+
+ allow $1 armtechdaemon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive armtechdaemon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_armtechdaemon_server_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_server_packet_t;
+ ')
+
+ dontaudit $1 armtechdaemon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive armtechdaemon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_armtechdaemon_server_packets'($*)) dnl
+
+ corenet_send_armtechdaemon_server_packets($1)
+ corenet_receive_armtechdaemon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive armtechdaemon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_armtechdaemon_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_armtechdaemon_server_packets($1)
+ corenet_dontaudit_receive_armtechdaemon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to armtechdaemon_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_armtechdaemon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_armtechdaemon_server_packets'($*)) dnl
+
+ gen_require(`
+ type armtechdaemon_server_packet_t;
+ ')
+
+ allow $1 armtechdaemon_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_armtechdaemon_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the asterisk port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the asterisk port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the asterisk port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_asterisk_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_asterisk_port'($*)) dnl
+
+ gen_require(`
+ type asterisk_port_t;
+ ')
+
+ allow $1 asterisk_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_asterisk_port'($*)) dnl
+
+ gen_require(`
+ type asterisk_port_t;
+ ')
+
+ allow $1 asterisk_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_asterisk_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the asterisk port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_asterisk_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_asterisk_port'($*)) dnl
+
+ gen_require(`
+ type asterisk_port_t;
+ ')
+
+ allow $1 asterisk_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_asterisk_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send asterisk_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_asterisk_client_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_client_packet_t;
+ ')
+
+ allow $1 asterisk_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send asterisk_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_asterisk_client_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_client_packet_t;
+ ')
+
+ dontaudit $1 asterisk_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive asterisk_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_asterisk_client_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_client_packet_t;
+ ')
+
+ allow $1 asterisk_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive asterisk_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_asterisk_client_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_client_packet_t;
+ ')
+
+ dontaudit $1 asterisk_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive asterisk_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_asterisk_client_packets'($*)) dnl
+
+ corenet_send_asterisk_client_packets($1)
+ corenet_receive_asterisk_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive asterisk_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_asterisk_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_asterisk_client_packets($1)
+ corenet_dontaudit_receive_asterisk_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_asterisk_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to asterisk_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_asterisk_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_asterisk_client_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_client_packet_t;
+ ')
+
+ allow $1 asterisk_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_asterisk_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send asterisk_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_asterisk_server_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_server_packet_t;
+ ')
+
+ allow $1 asterisk_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send asterisk_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_asterisk_server_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_server_packet_t;
+ ')
+
+ dontaudit $1 asterisk_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive asterisk_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_asterisk_server_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_server_packet_t;
+ ')
+
+ allow $1 asterisk_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive asterisk_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_asterisk_server_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_server_packet_t;
+ ')
+
+ dontaudit $1 asterisk_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive asterisk_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_asterisk_server_packets'($*)) dnl
+
+ corenet_send_asterisk_server_packets($1)
+ corenet_receive_asterisk_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive asterisk_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_asterisk_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_asterisk_server_packets($1)
+ corenet_dontaudit_receive_asterisk_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_asterisk_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to asterisk_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_asterisk_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_asterisk_server_packets'($*)) dnl
+
+ gen_require(`
+ type asterisk_server_packet_t;
+ ')
+
+ allow $1 asterisk_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_asterisk_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the audit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the audit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the audit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_audit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_audit_port'($*)) dnl
+
+ gen_require(`
+ type audit_port_t;
+ ')
+
+ allow $1 audit_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_audit_port'($*)) dnl
+
+ gen_require(`
+ type audit_port_t;
+ ')
+
+ allow $1 audit_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_audit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the audit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_audit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_audit_port'($*)) dnl
+
+ gen_require(`
+ type audit_port_t;
+ ')
+
+ allow $1 audit_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_audit_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send audit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_audit_client_packets'($*)) dnl
+
+ gen_require(`
+ type audit_client_packet_t;
+ ')
+
+ allow $1 audit_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send audit_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_audit_client_packets'($*)) dnl
+
+ gen_require(`
+ type audit_client_packet_t;
+ ')
+
+ dontaudit $1 audit_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive audit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_audit_client_packets'($*)) dnl
+
+ gen_require(`
+ type audit_client_packet_t;
+ ')
+
+ allow $1 audit_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive audit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_audit_client_packets'($*)) dnl
+
+ gen_require(`
+ type audit_client_packet_t;
+ ')
+
+ dontaudit $1 audit_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive audit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_audit_client_packets'($*)) dnl
+
+ corenet_send_audit_client_packets($1)
+ corenet_receive_audit_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive audit_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_audit_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_audit_client_packets($1)
+ corenet_dontaudit_receive_audit_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_audit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to audit_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_audit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_audit_client_packets'($*)) dnl
+
+ gen_require(`
+ type audit_client_packet_t;
+ ')
+
+ allow $1 audit_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_audit_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send audit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_audit_server_packets'($*)) dnl
+
+ gen_require(`
+ type audit_server_packet_t;
+ ')
+
+ allow $1 audit_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send audit_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_audit_server_packets'($*)) dnl
+
+ gen_require(`
+ type audit_server_packet_t;
+ ')
+
+ dontaudit $1 audit_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive audit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_audit_server_packets'($*)) dnl
+
+ gen_require(`
+ type audit_server_packet_t;
+ ')
+
+ allow $1 audit_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive audit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_audit_server_packets'($*)) dnl
+
+ gen_require(`
+ type audit_server_packet_t;
+ ')
+
+ dontaudit $1 audit_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive audit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_audit_server_packets'($*)) dnl
+
+ corenet_send_audit_server_packets($1)
+ corenet_receive_audit_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive audit_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_audit_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_audit_server_packets($1)
+ corenet_dontaudit_receive_audit_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_audit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to audit_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_audit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_audit_server_packets'($*)) dnl
+
+ gen_require(`
+ type audit_server_packet_t;
+ ')
+
+ allow $1 audit_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_audit_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the auth port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the auth port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the auth port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_auth_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_auth_port'($*)) dnl
+
+ gen_require(`
+ type auth_port_t;
+ ')
+
+ allow $1 auth_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_auth_port'($*)) dnl
+
+ gen_require(`
+ type auth_port_t;
+ ')
+
+ allow $1 auth_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_auth_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the auth port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_auth_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_auth_port'($*)) dnl
+
+ gen_require(`
+ type auth_port_t;
+ ')
+
+ allow $1 auth_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_auth_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send auth_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_auth_client_packets'($*)) dnl
+
+ gen_require(`
+ type auth_client_packet_t;
+ ')
+
+ allow $1 auth_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send auth_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_auth_client_packets'($*)) dnl
+
+ gen_require(`
+ type auth_client_packet_t;
+ ')
+
+ dontaudit $1 auth_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive auth_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_auth_client_packets'($*)) dnl
+
+ gen_require(`
+ type auth_client_packet_t;
+ ')
+
+ allow $1 auth_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive auth_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_auth_client_packets'($*)) dnl
+
+ gen_require(`
+ type auth_client_packet_t;
+ ')
+
+ dontaudit $1 auth_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive auth_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_auth_client_packets'($*)) dnl
+
+ corenet_send_auth_client_packets($1)
+ corenet_receive_auth_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive auth_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_auth_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_auth_client_packets($1)
+ corenet_dontaudit_receive_auth_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_auth_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to auth_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_auth_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_auth_client_packets'($*)) dnl
+
+ gen_require(`
+ type auth_client_packet_t;
+ ')
+
+ allow $1 auth_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_auth_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send auth_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_auth_server_packets'($*)) dnl
+
+ gen_require(`
+ type auth_server_packet_t;
+ ')
+
+ allow $1 auth_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send auth_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_auth_server_packets'($*)) dnl
+
+ gen_require(`
+ type auth_server_packet_t;
+ ')
+
+ dontaudit $1 auth_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive auth_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_auth_server_packets'($*)) dnl
+
+ gen_require(`
+ type auth_server_packet_t;
+ ')
+
+ allow $1 auth_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive auth_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_auth_server_packets'($*)) dnl
+
+ gen_require(`
+ type auth_server_packet_t;
+ ')
+
+ dontaudit $1 auth_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive auth_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_auth_server_packets'($*)) dnl
+
+ corenet_send_auth_server_packets($1)
+ corenet_receive_auth_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive auth_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_auth_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_auth_server_packets($1)
+ corenet_dontaudit_receive_auth_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_auth_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to auth_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_auth_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_auth_server_packets'($*)) dnl
+
+ gen_require(`
+ type auth_server_packet_t;
+ ')
+
+ allow $1 auth_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_auth_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the bgp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the bgp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the bgp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_bgp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_bgp_port'($*)) dnl
+
+ gen_require(`
+ type bgp_port_t;
+ ')
+
+ allow $1 bgp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_bgp_port'($*)) dnl
+
+ gen_require(`
+ type bgp_port_t;
+ ')
+
+ allow $1 bgp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_bgp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the bgp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_bgp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_bgp_port'($*)) dnl
+
+ gen_require(`
+ type bgp_port_t;
+ ')
+
+ allow $1 bgp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_bgp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send bgp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_bgp_client_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_client_packet_t;
+ ')
+
+ allow $1 bgp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send bgp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bgp_client_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_client_packet_t;
+ ')
+
+ dontaudit $1 bgp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive bgp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_bgp_client_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_client_packet_t;
+ ')
+
+ allow $1 bgp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive bgp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bgp_client_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_client_packet_t;
+ ')
+
+ dontaudit $1 bgp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive bgp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bgp_client_packets'($*)) dnl
+
+ corenet_send_bgp_client_packets($1)
+ corenet_receive_bgp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive bgp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bgp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_bgp_client_packets($1)
+ corenet_dontaudit_receive_bgp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bgp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to bgp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_bgp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bgp_client_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_client_packet_t;
+ ')
+
+ allow $1 bgp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_bgp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send bgp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_bgp_server_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_server_packet_t;
+ ')
+
+ allow $1 bgp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send bgp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bgp_server_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_server_packet_t;
+ ')
+
+ dontaudit $1 bgp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive bgp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_bgp_server_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_server_packet_t;
+ ')
+
+ allow $1 bgp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive bgp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bgp_server_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_server_packet_t;
+ ')
+
+ dontaudit $1 bgp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive bgp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bgp_server_packets'($*)) dnl
+
+ corenet_send_bgp_server_packets($1)
+ corenet_receive_bgp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive bgp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bgp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_bgp_server_packets($1)
+ corenet_dontaudit_receive_bgp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bgp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to bgp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_bgp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bgp_server_packets'($*)) dnl
+
+ gen_require(`
+ type bgp_server_packet_t;
+ ')
+
+ allow $1 bgp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_bgp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the bitcoin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_bitcoin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_bitcoin_port'($*)) dnl
+
+ gen_require(`
+ type bitcoin_port_t;
+ ')
+
+ allow $1 bitcoin_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_bitcoin_port'($*)) dnl
+
+ gen_require(`
+ type bitcoin_port_t;
+ ')
+
+ allow $1 bitcoin_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_bitcoin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the bitcoin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_bitcoin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_bitcoin_port'($*)) dnl
+
+ gen_require(`
+ type bitcoin_port_t;
+ ')
+
+ allow $1 bitcoin_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_bitcoin_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send bitcoin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_bitcoin_client_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_client_packet_t;
+ ')
+
+ allow $1 bitcoin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send bitcoin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bitcoin_client_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_client_packet_t;
+ ')
+
+ dontaudit $1 bitcoin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive bitcoin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_bitcoin_client_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_client_packet_t;
+ ')
+
+ allow $1 bitcoin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive bitcoin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bitcoin_client_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_client_packet_t;
+ ')
+
+ dontaudit $1 bitcoin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive bitcoin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bitcoin_client_packets'($*)) dnl
+
+ corenet_send_bitcoin_client_packets($1)
+ corenet_receive_bitcoin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive bitcoin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bitcoin_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_bitcoin_client_packets($1)
+ corenet_dontaudit_receive_bitcoin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to bitcoin_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_bitcoin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bitcoin_client_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_client_packet_t;
+ ')
+
+ allow $1 bitcoin_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_bitcoin_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send bitcoin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_bitcoin_server_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_server_packet_t;
+ ')
+
+ allow $1 bitcoin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send bitcoin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_bitcoin_server_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_server_packet_t;
+ ')
+
+ dontaudit $1 bitcoin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive bitcoin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_bitcoin_server_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_server_packet_t;
+ ')
+
+ allow $1 bitcoin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive bitcoin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_bitcoin_server_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_server_packet_t;
+ ')
+
+ dontaudit $1 bitcoin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive bitcoin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_bitcoin_server_packets'($*)) dnl
+
+ corenet_send_bitcoin_server_packets($1)
+ corenet_receive_bitcoin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive bitcoin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_bitcoin_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_bitcoin_server_packets($1)
+ corenet_dontaudit_receive_bitcoin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to bitcoin_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_bitcoin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_bitcoin_server_packets'($*)) dnl
+
+ gen_require(`
+ type bitcoin_server_packet_t;
+ ')
+
+ allow $1 bitcoin_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_bitcoin_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the boinc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the boinc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the boinc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_boinc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_boinc_port'($*)) dnl
+
+ gen_require(`
+ type boinc_port_t;
+ ')
+
+ allow $1 boinc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_boinc_port'($*)) dnl
+
+ gen_require(`
+ type boinc_port_t;
+ ')
+
+ allow $1 boinc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_boinc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the boinc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_boinc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_boinc_port'($*)) dnl
+
+ gen_require(`
+ type boinc_port_t;
+ ')
+
+ allow $1 boinc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_boinc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send boinc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_packet_t;
+ ')
+
+ allow $1 boinc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send boinc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive boinc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_packet_t;
+ ')
+
+ allow $1 boinc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive boinc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive boinc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_packets'($*)) dnl
+
+ corenet_send_boinc_client_packets($1)
+ corenet_receive_boinc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive boinc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_boinc_client_packets($1)
+ corenet_dontaudit_receive_boinc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to boinc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_boinc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_packet_t;
+ ')
+
+ allow $1 boinc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send boinc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_server_packet_t;
+ ')
+
+ allow $1 boinc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send boinc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_server_packet_t;
+ ')
+
+ dontaudit $1 boinc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive boinc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_server_packet_t;
+ ')
+
+ allow $1 boinc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive boinc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_server_packet_t;
+ ')
+
+ dontaudit $1 boinc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive boinc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_server_packets'($*)) dnl
+
+ corenet_send_boinc_server_packets($1)
+ corenet_receive_boinc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive boinc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_boinc_server_packets($1)
+ corenet_dontaudit_receive_boinc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to boinc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_boinc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_server_packet_t;
+ ')
+
+ allow $1 boinc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the boinc_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_boinc_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_boinc_client_port'($*)) dnl
+
+ gen_require(`
+ type boinc_client_port_t;
+ ')
+
+ allow $1 boinc_client_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_boinc_client_port'($*)) dnl
+
+ gen_require(`
+ type boinc_client_port_t;
+ ')
+
+ allow $1 boinc_client_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_boinc_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the boinc_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_boinc_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_boinc_client_port'($*)) dnl
+
+ gen_require(`
+ type boinc_client_port_t;
+ ')
+
+ allow $1 boinc_client_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_boinc_client_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send boinc_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_client_packet_t;
+ ')
+
+ allow $1 boinc_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send boinc_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_client_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive boinc_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_client_packet_t;
+ ')
+
+ allow $1 boinc_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive boinc_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_client_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive boinc_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_client_packets'($*)) dnl
+
+ corenet_send_boinc_client_client_packets($1)
+ corenet_receive_boinc_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive boinc_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_boinc_client_client_packets($1)
+ corenet_dontaudit_receive_boinc_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to boinc_client_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_boinc_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_client_packet_t;
+ ')
+
+ allow $1 boinc_client_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send boinc_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_boinc_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_server_packet_t;
+ ')
+
+ allow $1 boinc_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send boinc_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_boinc_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_server_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive boinc_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_boinc_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_server_packet_t;
+ ')
+
+ allow $1 boinc_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive boinc_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_boinc_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_server_packet_t;
+ ')
+
+ dontaudit $1 boinc_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive boinc_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_boinc_client_server_packets'($*)) dnl
+
+ corenet_send_boinc_client_server_packets($1)
+ corenet_receive_boinc_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive boinc_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_boinc_client_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_boinc_client_server_packets($1)
+ corenet_dontaudit_receive_boinc_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to boinc_client_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_boinc_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_boinc_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type boinc_client_server_packet_t;
+ ')
+
+ allow $1 boinc_client_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_boinc_client_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the biff port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the biff port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the biff port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_biff_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_biff_port'($*)) dnl
+
+ gen_require(`
+ type biff_port_t;
+ ')
+
+ allow $1 biff_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_biff_port'($*)) dnl
+
+ gen_require(`
+ type biff_port_t;
+ ')
+
+ allow $1 biff_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_biff_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the biff port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_biff_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_biff_port'($*)) dnl
+
+ gen_require(`
+ type biff_port_t;
+ ')
+
+ allow $1 biff_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_biff_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send biff_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_biff_client_packets'($*)) dnl
+
+ gen_require(`
+ type biff_client_packet_t;
+ ')
+
+ allow $1 biff_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send biff_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_biff_client_packets'($*)) dnl
+
+ gen_require(`
+ type biff_client_packet_t;
+ ')
+
+ dontaudit $1 biff_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive biff_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_biff_client_packets'($*)) dnl
+
+ gen_require(`
+ type biff_client_packet_t;
+ ')
+
+ allow $1 biff_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive biff_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_biff_client_packets'($*)) dnl
+
+ gen_require(`
+ type biff_client_packet_t;
+ ')
+
+ dontaudit $1 biff_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive biff_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_biff_client_packets'($*)) dnl
+
+ corenet_send_biff_client_packets($1)
+ corenet_receive_biff_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive biff_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_biff_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_biff_client_packets($1)
+ corenet_dontaudit_receive_biff_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_biff_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to biff_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_biff_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_biff_client_packets'($*)) dnl
+
+ gen_require(`
+ type biff_client_packet_t;
+ ')
+
+ allow $1 biff_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_biff_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send biff_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_biff_server_packets'($*)) dnl
+
+ gen_require(`
+ type biff_server_packet_t;
+ ')
+
+ allow $1 biff_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send biff_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_biff_server_packets'($*)) dnl
+
+ gen_require(`
+ type biff_server_packet_t;
+ ')
+
+ dontaudit $1 biff_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive biff_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_biff_server_packets'($*)) dnl
+
+ gen_require(`
+ type biff_server_packet_t;
+ ')
+
+ allow $1 biff_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive biff_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_biff_server_packets'($*)) dnl
+
+ gen_require(`
+ type biff_server_packet_t;
+ ')
+
+ dontaudit $1 biff_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive biff_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_biff_server_packets'($*)) dnl
+
+ corenet_send_biff_server_packets($1)
+ corenet_receive_biff_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive biff_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_biff_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_biff_server_packets($1)
+ corenet_dontaudit_receive_biff_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_biff_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to biff_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_biff_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_biff_server_packets'($*)) dnl
+
+ gen_require(`
+ type biff_server_packet_t;
+ ')
+
+ allow $1 biff_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_biff_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the certmaster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the certmaster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the certmaster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_certmaster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_certmaster_port'($*)) dnl
+
+ gen_require(`
+ type certmaster_port_t;
+ ')
+
+ allow $1 certmaster_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_certmaster_port'($*)) dnl
+
+ gen_require(`
+ type certmaster_port_t;
+ ')
+
+ allow $1 certmaster_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_certmaster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the certmaster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_certmaster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_certmaster_port'($*)) dnl
+
+ gen_require(`
+ type certmaster_port_t;
+ ')
+
+ allow $1 certmaster_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_certmaster_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send certmaster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_certmaster_client_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_client_packet_t;
+ ')
+
+ allow $1 certmaster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send certmaster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_certmaster_client_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_client_packet_t;
+ ')
+
+ dontaudit $1 certmaster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive certmaster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_certmaster_client_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_client_packet_t;
+ ')
+
+ allow $1 certmaster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive certmaster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_certmaster_client_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_client_packet_t;
+ ')
+
+ dontaudit $1 certmaster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive certmaster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_certmaster_client_packets'($*)) dnl
+
+ corenet_send_certmaster_client_packets($1)
+ corenet_receive_certmaster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive certmaster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_certmaster_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_certmaster_client_packets($1)
+ corenet_dontaudit_receive_certmaster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_certmaster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to certmaster_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_certmaster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_certmaster_client_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_client_packet_t;
+ ')
+
+ allow $1 certmaster_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_certmaster_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send certmaster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_certmaster_server_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_server_packet_t;
+ ')
+
+ allow $1 certmaster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send certmaster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_certmaster_server_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_server_packet_t;
+ ')
+
+ dontaudit $1 certmaster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive certmaster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_certmaster_server_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_server_packet_t;
+ ')
+
+ allow $1 certmaster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive certmaster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_certmaster_server_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_server_packet_t;
+ ')
+
+ dontaudit $1 certmaster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive certmaster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_certmaster_server_packets'($*)) dnl
+
+ corenet_send_certmaster_server_packets($1)
+ corenet_receive_certmaster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive certmaster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_certmaster_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_certmaster_server_packets($1)
+ corenet_dontaudit_receive_certmaster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_certmaster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to certmaster_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_certmaster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_certmaster_server_packets'($*)) dnl
+
+ gen_require(`
+ type certmaster_server_packet_t;
+ ')
+
+ allow $1 certmaster_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_certmaster_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the chronyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the chronyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the chronyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_chronyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_chronyd_port'($*)) dnl
+
+ gen_require(`
+ type chronyd_port_t;
+ ')
+
+ allow $1 chronyd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_chronyd_port'($*)) dnl
+
+ gen_require(`
+ type chronyd_port_t;
+ ')
+
+ allow $1 chronyd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_chronyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the chronyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_chronyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_chronyd_port'($*)) dnl
+
+ gen_require(`
+ type chronyd_port_t;
+ ')
+
+ allow $1 chronyd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_chronyd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send chronyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_chronyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_client_packet_t;
+ ')
+
+ allow $1 chronyd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send chronyd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_chronyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_client_packet_t;
+ ')
+
+ dontaudit $1 chronyd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive chronyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_chronyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_client_packet_t;
+ ')
+
+ allow $1 chronyd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive chronyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_chronyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_client_packet_t;
+ ')
+
+ dontaudit $1 chronyd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive chronyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_chronyd_client_packets'($*)) dnl
+
+ corenet_send_chronyd_client_packets($1)
+ corenet_receive_chronyd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive chronyd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_chronyd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_chronyd_client_packets($1)
+ corenet_dontaudit_receive_chronyd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_chronyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to chronyd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_chronyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_chronyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_client_packet_t;
+ ')
+
+ allow $1 chronyd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_chronyd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send chronyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_chronyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_server_packet_t;
+ ')
+
+ allow $1 chronyd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send chronyd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_chronyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_server_packet_t;
+ ')
+
+ dontaudit $1 chronyd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive chronyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_chronyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_server_packet_t;
+ ')
+
+ allow $1 chronyd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive chronyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_chronyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_server_packet_t;
+ ')
+
+ dontaudit $1 chronyd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive chronyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_chronyd_server_packets'($*)) dnl
+
+ corenet_send_chronyd_server_packets($1)
+ corenet_receive_chronyd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive chronyd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_chronyd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_chronyd_server_packets($1)
+ corenet_dontaudit_receive_chronyd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_chronyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to chronyd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_chronyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_chronyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type chronyd_server_packet_t;
+ ')
+
+ allow $1 chronyd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_chronyd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the clamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the clamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the clamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_clamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_clamd_port'($*)) dnl
+
+ gen_require(`
+ type clamd_port_t;
+ ')
+
+ allow $1 clamd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_clamd_port'($*)) dnl
+
+ gen_require(`
+ type clamd_port_t;
+ ')
+
+ allow $1 clamd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_clamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the clamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_clamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_clamd_port'($*)) dnl
+
+ gen_require(`
+ type clamd_port_t;
+ ')
+
+ allow $1 clamd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_clamd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send clamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_clamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_client_packet_t;
+ ')
+
+ allow $1 clamd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send clamd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_client_packet_t;
+ ')
+
+ dontaudit $1 clamd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive clamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_clamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_client_packet_t;
+ ')
+
+ allow $1 clamd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive clamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_client_packet_t;
+ ')
+
+ dontaudit $1 clamd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive clamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clamd_client_packets'($*)) dnl
+
+ corenet_send_clamd_client_packets($1)
+ corenet_receive_clamd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive clamd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clamd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_clamd_client_packets($1)
+ corenet_dontaudit_receive_clamd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to clamd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_clamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_client_packet_t;
+ ')
+
+ allow $1 clamd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_clamd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send clamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_clamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_server_packet_t;
+ ')
+
+ allow $1 clamd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send clamd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_server_packet_t;
+ ')
+
+ dontaudit $1 clamd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive clamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_clamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_server_packet_t;
+ ')
+
+ allow $1 clamd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive clamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_server_packet_t;
+ ')
+
+ dontaudit $1 clamd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive clamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clamd_server_packets'($*)) dnl
+
+ corenet_send_clamd_server_packets($1)
+ corenet_receive_clamd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive clamd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clamd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_clamd_server_packets($1)
+ corenet_dontaudit_receive_clamd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to clamd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_clamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type clamd_server_packet_t;
+ ')
+
+ allow $1 clamd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_clamd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the clockspeed port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_clockspeed_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_clockspeed_port'($*)) dnl
+
+ gen_require(`
+ type clockspeed_port_t;
+ ')
+
+ allow $1 clockspeed_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_clockspeed_port'($*)) dnl
+
+ gen_require(`
+ type clockspeed_port_t;
+ ')
+
+ allow $1 clockspeed_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_clockspeed_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the clockspeed port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_clockspeed_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_clockspeed_port'($*)) dnl
+
+ gen_require(`
+ type clockspeed_port_t;
+ ')
+
+ allow $1 clockspeed_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_clockspeed_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send clockspeed_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_clockspeed_client_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_client_packet_t;
+ ')
+
+ allow $1 clockspeed_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send clockspeed_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clockspeed_client_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_client_packet_t;
+ ')
+
+ dontaudit $1 clockspeed_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive clockspeed_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_clockspeed_client_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_client_packet_t;
+ ')
+
+ allow $1 clockspeed_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive clockspeed_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clockspeed_client_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_client_packet_t;
+ ')
+
+ dontaudit $1 clockspeed_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive clockspeed_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clockspeed_client_packets'($*)) dnl
+
+ corenet_send_clockspeed_client_packets($1)
+ corenet_receive_clockspeed_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive clockspeed_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clockspeed_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_clockspeed_client_packets($1)
+ corenet_dontaudit_receive_clockspeed_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to clockspeed_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_clockspeed_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clockspeed_client_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_client_packet_t;
+ ')
+
+ allow $1 clockspeed_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_clockspeed_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send clockspeed_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_clockspeed_server_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_server_packet_t;
+ ')
+
+ allow $1 clockspeed_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send clockspeed_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_clockspeed_server_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_server_packet_t;
+ ')
+
+ dontaudit $1 clockspeed_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive clockspeed_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_clockspeed_server_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_server_packet_t;
+ ')
+
+ allow $1 clockspeed_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive clockspeed_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_clockspeed_server_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_server_packet_t;
+ ')
+
+ dontaudit $1 clockspeed_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive clockspeed_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_clockspeed_server_packets'($*)) dnl
+
+ corenet_send_clockspeed_server_packets($1)
+ corenet_receive_clockspeed_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive clockspeed_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_clockspeed_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_clockspeed_server_packets($1)
+ corenet_dontaudit_receive_clockspeed_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to clockspeed_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_clockspeed_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_clockspeed_server_packets'($*)) dnl
+
+ gen_require(`
+ type clockspeed_server_packet_t;
+ ')
+
+ allow $1 clockspeed_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_clockspeed_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cluster_port'($*)) dnl
+
+ gen_require(`
+ type cluster_port_t;
+ ')
+
+ allow $1 cluster_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cluster_port'($*)) dnl
+
+ gen_require(`
+ type cluster_port_t;
+ ')
+
+ allow $1 cluster_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cluster_port'($*)) dnl
+
+ gen_require(`
+ type cluster_port_t;
+ ')
+
+ allow $1 cluster_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cluster_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_client_packet_t;
+ ')
+
+ allow $1 cluster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cluster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_client_packet_t;
+ ')
+
+ dontaudit $1 cluster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_client_packet_t;
+ ')
+
+ allow $1 cluster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_client_packet_t;
+ ')
+
+ dontaudit $1 cluster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cluster_client_packets'($*)) dnl
+
+ corenet_send_cluster_client_packets($1)
+ corenet_receive_cluster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cluster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cluster_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cluster_client_packets($1)
+ corenet_dontaudit_receive_cluster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cluster_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_client_packet_t;
+ ')
+
+ allow $1 cluster_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cluster_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_server_packet_t;
+ ')
+
+ allow $1 cluster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cluster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_server_packet_t;
+ ')
+
+ dontaudit $1 cluster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_server_packet_t;
+ ')
+
+ allow $1 cluster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_server_packet_t;
+ ')
+
+ dontaudit $1 cluster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cluster_server_packets'($*)) dnl
+
+ corenet_send_cluster_server_packets($1)
+ corenet_receive_cluster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cluster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cluster_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cluster_server_packets($1)
+ corenet_dontaudit_receive_cluster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cluster_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type cluster_server_packet_t;
+ ')
+
+ allow $1 cluster_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cluster_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cma_port'($*)) dnl
+
+ gen_require(`
+ type cma_port_t;
+ ')
+
+ allow $1 cma_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cma_port'($*)) dnl
+
+ gen_require(`
+ type cma_port_t;
+ ')
+
+ allow $1 cma_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cma_port'($*)) dnl
+
+ gen_require(`
+ type cma_port_t;
+ ')
+
+ allow $1 cma_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cma_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cma_client_packets'($*)) dnl
+
+ gen_require(`
+ type cma_client_packet_t;
+ ')
+
+ allow $1 cma_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cma_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cma_client_packets'($*)) dnl
+
+ gen_require(`
+ type cma_client_packet_t;
+ ')
+
+ dontaudit $1 cma_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cma_client_packets'($*)) dnl
+
+ gen_require(`
+ type cma_client_packet_t;
+ ')
+
+ allow $1 cma_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cma_client_packets'($*)) dnl
+
+ gen_require(`
+ type cma_client_packet_t;
+ ')
+
+ dontaudit $1 cma_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cma_client_packets'($*)) dnl
+
+ corenet_send_cma_client_packets($1)
+ corenet_receive_cma_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cma_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cma_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cma_client_packets($1)
+ corenet_dontaudit_receive_cma_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cma_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cma_client_packets'($*)) dnl
+
+ gen_require(`
+ type cma_client_packet_t;
+ ')
+
+ allow $1 cma_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cma_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cma_server_packets'($*)) dnl
+
+ gen_require(`
+ type cma_server_packet_t;
+ ')
+
+ allow $1 cma_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cma_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cma_server_packets'($*)) dnl
+
+ gen_require(`
+ type cma_server_packet_t;
+ ')
+
+ dontaudit $1 cma_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cma_server_packets'($*)) dnl
+
+ gen_require(`
+ type cma_server_packet_t;
+ ')
+
+ allow $1 cma_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cma_server_packets'($*)) dnl
+
+ gen_require(`
+ type cma_server_packet_t;
+ ')
+
+ dontaudit $1 cma_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cma_server_packets'($*)) dnl
+
+ corenet_send_cma_server_packets($1)
+ corenet_receive_cma_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cma_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cma_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cma_server_packets($1)
+ corenet_dontaudit_receive_cma_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cma_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cma_server_packets'($*)) dnl
+
+ gen_require(`
+ type cma_server_packet_t;
+ ')
+
+ allow $1 cma_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cma_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cobbler port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cobbler port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cobbler port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cobbler_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cobbler_port'($*)) dnl
+
+ gen_require(`
+ type cobbler_port_t;
+ ')
+
+ allow $1 cobbler_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cobbler_port'($*)) dnl
+
+ gen_require(`
+ type cobbler_port_t;
+ ')
+
+ allow $1 cobbler_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cobbler_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cobbler port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cobbler_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cobbler_port'($*)) dnl
+
+ gen_require(`
+ type cobbler_port_t;
+ ')
+
+ allow $1 cobbler_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cobbler_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cobbler_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cobbler_client_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_client_packet_t;
+ ')
+
+ allow $1 cobbler_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cobbler_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cobbler_client_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_client_packet_t;
+ ')
+
+ dontaudit $1 cobbler_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cobbler_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cobbler_client_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_client_packet_t;
+ ')
+
+ allow $1 cobbler_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cobbler_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cobbler_client_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_client_packet_t;
+ ')
+
+ dontaudit $1 cobbler_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cobbler_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cobbler_client_packets'($*)) dnl
+
+ corenet_send_cobbler_client_packets($1)
+ corenet_receive_cobbler_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cobbler_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cobbler_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cobbler_client_packets($1)
+ corenet_dontaudit_receive_cobbler_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cobbler_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cobbler_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cobbler_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cobbler_client_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_client_packet_t;
+ ')
+
+ allow $1 cobbler_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cobbler_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cobbler_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cobbler_server_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_server_packet_t;
+ ')
+
+ allow $1 cobbler_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cobbler_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cobbler_server_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_server_packet_t;
+ ')
+
+ dontaudit $1 cobbler_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cobbler_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cobbler_server_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_server_packet_t;
+ ')
+
+ allow $1 cobbler_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cobbler_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cobbler_server_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_server_packet_t;
+ ')
+
+ dontaudit $1 cobbler_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cobbler_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cobbler_server_packets'($*)) dnl
+
+ corenet_send_cobbler_server_packets($1)
+ corenet_receive_cobbler_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cobbler_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cobbler_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cobbler_server_packets($1)
+ corenet_dontaudit_receive_cobbler_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cobbler_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cobbler_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cobbler_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cobbler_server_packets'($*)) dnl
+
+ gen_require(`
+ type cobbler_server_packet_t;
+ ')
+
+ allow $1 cobbler_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cobbler_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the commplex_link port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_commplex_link_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_commplex_link_port'($*)) dnl
+
+ gen_require(`
+ type commplex_link_port_t;
+ ')
+
+ allow $1 commplex_link_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_commplex_link_port'($*)) dnl
+
+ gen_require(`
+ type commplex_link_port_t;
+ ')
+
+ allow $1 commplex_link_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_commplex_link_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the commplex_link port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_commplex_link_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_commplex_link_port'($*)) dnl
+
+ gen_require(`
+ type commplex_link_port_t;
+ ')
+
+ allow $1 commplex_link_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_commplex_link_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send commplex_link_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_link_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_client_packet_t;
+ ')
+
+ allow $1 commplex_link_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send commplex_link_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_link_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_client_packet_t;
+ ')
+
+ dontaudit $1 commplex_link_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive commplex_link_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_link_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_client_packet_t;
+ ')
+
+ allow $1 commplex_link_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive commplex_link_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_link_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_client_packet_t;
+ ')
+
+ dontaudit $1 commplex_link_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive commplex_link_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_link_client_packets'($*)) dnl
+
+ corenet_send_commplex_link_client_packets($1)
+ corenet_receive_commplex_link_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive commplex_link_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_link_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_commplex_link_client_packets($1)
+ corenet_dontaudit_receive_commplex_link_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to commplex_link_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_commplex_link_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_link_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_client_packet_t;
+ ')
+
+ allow $1 commplex_link_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_link_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send commplex_link_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_link_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_server_packet_t;
+ ')
+
+ allow $1 commplex_link_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send commplex_link_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_link_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_server_packet_t;
+ ')
+
+ dontaudit $1 commplex_link_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive commplex_link_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_link_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_server_packet_t;
+ ')
+
+ allow $1 commplex_link_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive commplex_link_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_link_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_server_packet_t;
+ ')
+
+ dontaudit $1 commplex_link_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive commplex_link_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_link_server_packets'($*)) dnl
+
+ corenet_send_commplex_link_server_packets($1)
+ corenet_receive_commplex_link_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive commplex_link_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_link_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_commplex_link_server_packets($1)
+ corenet_dontaudit_receive_commplex_link_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to commplex_link_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_commplex_link_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_link_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_link_server_packet_t;
+ ')
+
+ allow $1 commplex_link_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_link_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the commplex_main port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_commplex_main_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_commplex_main_port'($*)) dnl
+
+ gen_require(`
+ type commplex_main_port_t;
+ ')
+
+ allow $1 commplex_main_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_commplex_main_port'($*)) dnl
+
+ gen_require(`
+ type commplex_main_port_t;
+ ')
+
+ allow $1 commplex_main_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_commplex_main_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the commplex_main port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_commplex_main_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_commplex_main_port'($*)) dnl
+
+ gen_require(`
+ type commplex_main_port_t;
+ ')
+
+ allow $1 commplex_main_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_commplex_main_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send commplex_main_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_main_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_client_packet_t;
+ ')
+
+ allow $1 commplex_main_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send commplex_main_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_main_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_client_packet_t;
+ ')
+
+ dontaudit $1 commplex_main_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive commplex_main_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_main_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_client_packet_t;
+ ')
+
+ allow $1 commplex_main_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive commplex_main_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_main_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_client_packet_t;
+ ')
+
+ dontaudit $1 commplex_main_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive commplex_main_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_main_client_packets'($*)) dnl
+
+ corenet_send_commplex_main_client_packets($1)
+ corenet_receive_commplex_main_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive commplex_main_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_main_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_commplex_main_client_packets($1)
+ corenet_dontaudit_receive_commplex_main_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to commplex_main_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_commplex_main_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_main_client_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_client_packet_t;
+ ')
+
+ allow $1 commplex_main_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_main_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send commplex_main_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_commplex_main_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_server_packet_t;
+ ')
+
+ allow $1 commplex_main_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send commplex_main_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_commplex_main_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_server_packet_t;
+ ')
+
+ dontaudit $1 commplex_main_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive commplex_main_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_commplex_main_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_server_packet_t;
+ ')
+
+ allow $1 commplex_main_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive commplex_main_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_commplex_main_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_server_packet_t;
+ ')
+
+ dontaudit $1 commplex_main_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive commplex_main_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_commplex_main_server_packets'($*)) dnl
+
+ corenet_send_commplex_main_server_packets($1)
+ corenet_receive_commplex_main_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive commplex_main_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_commplex_main_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_commplex_main_server_packets($1)
+ corenet_dontaudit_receive_commplex_main_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to commplex_main_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_commplex_main_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_commplex_main_server_packets'($*)) dnl
+
+ gen_require(`
+ type commplex_main_server_packet_t;
+ ')
+
+ allow $1 commplex_main_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_commplex_main_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the comsat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the comsat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the comsat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_comsat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_comsat_port'($*)) dnl
+
+ gen_require(`
+ type comsat_port_t;
+ ')
+
+ allow $1 comsat_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_comsat_port'($*)) dnl
+
+ gen_require(`
+ type comsat_port_t;
+ ')
+
+ allow $1 comsat_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_comsat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the comsat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_comsat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_comsat_port'($*)) dnl
+
+ gen_require(`
+ type comsat_port_t;
+ ')
+
+ allow $1 comsat_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_comsat_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send comsat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_comsat_client_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_client_packet_t;
+ ')
+
+ allow $1 comsat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send comsat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_comsat_client_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_client_packet_t;
+ ')
+
+ dontaudit $1 comsat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive comsat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_comsat_client_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_client_packet_t;
+ ')
+
+ allow $1 comsat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive comsat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_comsat_client_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_client_packet_t;
+ ')
+
+ dontaudit $1 comsat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive comsat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_comsat_client_packets'($*)) dnl
+
+ corenet_send_comsat_client_packets($1)
+ corenet_receive_comsat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive comsat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_comsat_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_comsat_client_packets($1)
+ corenet_dontaudit_receive_comsat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_comsat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to comsat_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_comsat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_comsat_client_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_client_packet_t;
+ ')
+
+ allow $1 comsat_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_comsat_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send comsat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_comsat_server_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_server_packet_t;
+ ')
+
+ allow $1 comsat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send comsat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_comsat_server_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_server_packet_t;
+ ')
+
+ dontaudit $1 comsat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive comsat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_comsat_server_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_server_packet_t;
+ ')
+
+ allow $1 comsat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive comsat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_comsat_server_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_server_packet_t;
+ ')
+
+ dontaudit $1 comsat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive comsat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_comsat_server_packets'($*)) dnl
+
+ corenet_send_comsat_server_packets($1)
+ corenet_receive_comsat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive comsat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_comsat_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_comsat_server_packets($1)
+ corenet_dontaudit_receive_comsat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_comsat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to comsat_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_comsat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_comsat_server_packets'($*)) dnl
+
+ gen_require(`
+ type comsat_server_packet_t;
+ ')
+
+ allow $1 comsat_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_comsat_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the condor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the condor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the condor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_condor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_condor_port'($*)) dnl
+
+ gen_require(`
+ type condor_port_t;
+ ')
+
+ allow $1 condor_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_condor_port'($*)) dnl
+
+ gen_require(`
+ type condor_port_t;
+ ')
+
+ allow $1 condor_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_condor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the condor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_condor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_condor_port'($*)) dnl
+
+ gen_require(`
+ type condor_port_t;
+ ')
+
+ allow $1 condor_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_condor_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send condor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_condor_client_packets'($*)) dnl
+
+ gen_require(`
+ type condor_client_packet_t;
+ ')
+
+ allow $1 condor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send condor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_condor_client_packets'($*)) dnl
+
+ gen_require(`
+ type condor_client_packet_t;
+ ')
+
+ dontaudit $1 condor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive condor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_condor_client_packets'($*)) dnl
+
+ gen_require(`
+ type condor_client_packet_t;
+ ')
+
+ allow $1 condor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive condor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_condor_client_packets'($*)) dnl
+
+ gen_require(`
+ type condor_client_packet_t;
+ ')
+
+ dontaudit $1 condor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive condor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_condor_client_packets'($*)) dnl
+
+ corenet_send_condor_client_packets($1)
+ corenet_receive_condor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive condor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_condor_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_condor_client_packets($1)
+ corenet_dontaudit_receive_condor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_condor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to condor_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_condor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_condor_client_packets'($*)) dnl
+
+ gen_require(`
+ type condor_client_packet_t;
+ ')
+
+ allow $1 condor_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_condor_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send condor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_condor_server_packets'($*)) dnl
+
+ gen_require(`
+ type condor_server_packet_t;
+ ')
+
+ allow $1 condor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send condor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_condor_server_packets'($*)) dnl
+
+ gen_require(`
+ type condor_server_packet_t;
+ ')
+
+ dontaudit $1 condor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive condor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_condor_server_packets'($*)) dnl
+
+ gen_require(`
+ type condor_server_packet_t;
+ ')
+
+ allow $1 condor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive condor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_condor_server_packets'($*)) dnl
+
+ gen_require(`
+ type condor_server_packet_t;
+ ')
+
+ dontaudit $1 condor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive condor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_condor_server_packets'($*)) dnl
+
+ corenet_send_condor_server_packets($1)
+ corenet_receive_condor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive condor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_condor_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_condor_server_packets($1)
+ corenet_dontaudit_receive_condor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_condor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to condor_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_condor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_condor_server_packets'($*)) dnl
+
+ gen_require(`
+ type condor_server_packet_t;
+ ')
+
+ allow $1 condor_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_condor_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the couchdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the couchdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the couchdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_couchdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_couchdb_port'($*)) dnl
+
+ gen_require(`
+ type couchdb_port_t;
+ ')
+
+ allow $1 couchdb_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_couchdb_port'($*)) dnl
+
+ gen_require(`
+ type couchdb_port_t;
+ ')
+
+ allow $1 couchdb_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_couchdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the couchdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_couchdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_couchdb_port'($*)) dnl
+
+ gen_require(`
+ type couchdb_port_t;
+ ')
+
+ allow $1 couchdb_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_couchdb_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send couchdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_couchdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_client_packet_t;
+ ')
+
+ allow $1 couchdb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send couchdb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_couchdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_client_packet_t;
+ ')
+
+ dontaudit $1 couchdb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive couchdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_couchdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_client_packet_t;
+ ')
+
+ allow $1 couchdb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive couchdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_couchdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_client_packet_t;
+ ')
+
+ dontaudit $1 couchdb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive couchdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_couchdb_client_packets'($*)) dnl
+
+ corenet_send_couchdb_client_packets($1)
+ corenet_receive_couchdb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive couchdb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_couchdb_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_couchdb_client_packets($1)
+ corenet_dontaudit_receive_couchdb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_couchdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to couchdb_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_couchdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_couchdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_client_packet_t;
+ ')
+
+ allow $1 couchdb_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_couchdb_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send couchdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_couchdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_server_packet_t;
+ ')
+
+ allow $1 couchdb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send couchdb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_couchdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_server_packet_t;
+ ')
+
+ dontaudit $1 couchdb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive couchdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_couchdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_server_packet_t;
+ ')
+
+ allow $1 couchdb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive couchdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_couchdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_server_packet_t;
+ ')
+
+ dontaudit $1 couchdb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive couchdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_couchdb_server_packets'($*)) dnl
+
+ corenet_send_couchdb_server_packets($1)
+ corenet_receive_couchdb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive couchdb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_couchdb_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_couchdb_server_packets($1)
+ corenet_dontaudit_receive_couchdb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_couchdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to couchdb_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_couchdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_couchdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type couchdb_server_packet_t;
+ ')
+
+ allow $1 couchdb_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_couchdb_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cslistener port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cslistener port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cslistener port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cslistener_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cslistener_port'($*)) dnl
+
+ gen_require(`
+ type cslistener_port_t;
+ ')
+
+ allow $1 cslistener_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cslistener_port'($*)) dnl
+
+ gen_require(`
+ type cslistener_port_t;
+ ')
+
+ allow $1 cslistener_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cslistener_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cslistener port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cslistener_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cslistener_port'($*)) dnl
+
+ gen_require(`
+ type cslistener_port_t;
+ ')
+
+ allow $1 cslistener_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cslistener_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cslistener_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cslistener_client_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_client_packet_t;
+ ')
+
+ allow $1 cslistener_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cslistener_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cslistener_client_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_client_packet_t;
+ ')
+
+ dontaudit $1 cslistener_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cslistener_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cslistener_client_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_client_packet_t;
+ ')
+
+ allow $1 cslistener_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cslistener_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cslistener_client_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_client_packet_t;
+ ')
+
+ dontaudit $1 cslistener_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cslistener_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cslistener_client_packets'($*)) dnl
+
+ corenet_send_cslistener_client_packets($1)
+ corenet_receive_cslistener_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cslistener_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cslistener_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cslistener_client_packets($1)
+ corenet_dontaudit_receive_cslistener_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cslistener_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cslistener_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cslistener_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cslistener_client_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_client_packet_t;
+ ')
+
+ allow $1 cslistener_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cslistener_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cslistener_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cslistener_server_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_server_packet_t;
+ ')
+
+ allow $1 cslistener_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cslistener_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cslistener_server_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_server_packet_t;
+ ')
+
+ dontaudit $1 cslistener_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cslistener_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cslistener_server_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_server_packet_t;
+ ')
+
+ allow $1 cslistener_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cslistener_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cslistener_server_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_server_packet_t;
+ ')
+
+ dontaudit $1 cslistener_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cslistener_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cslistener_server_packets'($*)) dnl
+
+ corenet_send_cslistener_server_packets($1)
+ corenet_receive_cslistener_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cslistener_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cslistener_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cslistener_server_packets($1)
+ corenet_dontaudit_receive_cslistener_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cslistener_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cslistener_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cslistener_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cslistener_server_packets'($*)) dnl
+
+ gen_require(`
+ type cslistener_server_packet_t;
+ ')
+
+ allow $1 cslistener_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cslistener_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ctdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ctdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ctdb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ctdb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ctdb_port'($*)) dnl
+
+ gen_require(`
+ type ctdb_port_t;
+ ')
+
+ allow $1 ctdb_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ctdb_port'($*)) dnl
+
+ gen_require(`
+ type ctdb_port_t;
+ ')
+
+ allow $1 ctdb_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ctdb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ctdb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ctdb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ctdb_port'($*)) dnl
+
+ gen_require(`
+ type ctdb_port_t;
+ ')
+
+ allow $1 ctdb_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ctdb_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ctdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ctdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_client_packet_t;
+ ')
+
+ allow $1 ctdb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ctdb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ctdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_client_packet_t;
+ ')
+
+ dontaudit $1 ctdb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ctdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ctdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_client_packet_t;
+ ')
+
+ allow $1 ctdb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ctdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ctdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_client_packet_t;
+ ')
+
+ dontaudit $1 ctdb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ctdb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ctdb_client_packets'($*)) dnl
+
+ corenet_send_ctdb_client_packets($1)
+ corenet_receive_ctdb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ctdb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ctdb_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ctdb_client_packets($1)
+ corenet_dontaudit_receive_ctdb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ctdb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ctdb_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ctdb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ctdb_client_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_client_packet_t;
+ ')
+
+ allow $1 ctdb_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ctdb_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ctdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ctdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_server_packet_t;
+ ')
+
+ allow $1 ctdb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ctdb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ctdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_server_packet_t;
+ ')
+
+ dontaudit $1 ctdb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ctdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ctdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_server_packet_t;
+ ')
+
+ allow $1 ctdb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ctdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ctdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_server_packet_t;
+ ')
+
+ dontaudit $1 ctdb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ctdb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ctdb_server_packets'($*)) dnl
+
+ corenet_send_ctdb_server_packets($1)
+ corenet_receive_ctdb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ctdb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ctdb_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ctdb_server_packets($1)
+ corenet_dontaudit_receive_ctdb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ctdb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ctdb_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ctdb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ctdb_server_packets'($*)) dnl
+
+ gen_require(`
+ type ctdb_server_packet_t;
+ ')
+
+ allow $1 ctdb_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ctdb_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cvs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cvs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cvs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cvs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cvs_port'($*)) dnl
+
+ gen_require(`
+ type cvs_port_t;
+ ')
+
+ allow $1 cvs_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cvs_port'($*)) dnl
+
+ gen_require(`
+ type cvs_port_t;
+ ')
+
+ allow $1 cvs_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cvs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cvs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cvs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cvs_port'($*)) dnl
+
+ gen_require(`
+ type cvs_port_t;
+ ')
+
+ allow $1 cvs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cvs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cvs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cvs_client_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_client_packet_t;
+ ')
+
+ allow $1 cvs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cvs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cvs_client_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_client_packet_t;
+ ')
+
+ dontaudit $1 cvs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cvs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cvs_client_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_client_packet_t;
+ ')
+
+ allow $1 cvs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cvs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cvs_client_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_client_packet_t;
+ ')
+
+ dontaudit $1 cvs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cvs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cvs_client_packets'($*)) dnl
+
+ corenet_send_cvs_client_packets($1)
+ corenet_receive_cvs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cvs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cvs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cvs_client_packets($1)
+ corenet_dontaudit_receive_cvs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cvs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cvs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cvs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cvs_client_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_client_packet_t;
+ ')
+
+ allow $1 cvs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cvs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cvs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cvs_server_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_server_packet_t;
+ ')
+
+ allow $1 cvs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cvs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cvs_server_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_server_packet_t;
+ ')
+
+ dontaudit $1 cvs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cvs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cvs_server_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_server_packet_t;
+ ')
+
+ allow $1 cvs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cvs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cvs_server_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_server_packet_t;
+ ')
+
+ dontaudit $1 cvs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cvs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cvs_server_packets'($*)) dnl
+
+ corenet_send_cvs_server_packets($1)
+ corenet_receive_cvs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cvs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cvs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cvs_server_packets($1)
+ corenet_dontaudit_receive_cvs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cvs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cvs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cvs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cvs_server_packets'($*)) dnl
+
+ gen_require(`
+ type cvs_server_packet_t;
+ ')
+
+ allow $1 cvs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cvs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the cyphesis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_cyphesis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_cyphesis_port'($*)) dnl
+
+ gen_require(`
+ type cyphesis_port_t;
+ ')
+
+ allow $1 cyphesis_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_cyphesis_port'($*)) dnl
+
+ gen_require(`
+ type cyphesis_port_t;
+ ')
+
+ allow $1 cyphesis_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_cyphesis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the cyphesis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_cyphesis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_cyphesis_port'($*)) dnl
+
+ gen_require(`
+ type cyphesis_port_t;
+ ')
+
+ allow $1 cyphesis_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_cyphesis_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cyphesis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cyphesis_client_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_client_packet_t;
+ ')
+
+ allow $1 cyphesis_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cyphesis_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cyphesis_client_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_client_packet_t;
+ ')
+
+ dontaudit $1 cyphesis_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cyphesis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cyphesis_client_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_client_packet_t;
+ ')
+
+ allow $1 cyphesis_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cyphesis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cyphesis_client_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_client_packet_t;
+ ')
+
+ dontaudit $1 cyphesis_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cyphesis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cyphesis_client_packets'($*)) dnl
+
+ corenet_send_cyphesis_client_packets($1)
+ corenet_receive_cyphesis_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cyphesis_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cyphesis_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_cyphesis_client_packets($1)
+ corenet_dontaudit_receive_cyphesis_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cyphesis_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cyphesis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cyphesis_client_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_client_packet_t;
+ ')
+
+ allow $1 cyphesis_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cyphesis_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send cyphesis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_cyphesis_server_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_server_packet_t;
+ ')
+
+ allow $1 cyphesis_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send cyphesis_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_cyphesis_server_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_server_packet_t;
+ ')
+
+ dontaudit $1 cyphesis_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive cyphesis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_cyphesis_server_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_server_packet_t;
+ ')
+
+ allow $1 cyphesis_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive cyphesis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_cyphesis_server_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_server_packet_t;
+ ')
+
+ dontaudit $1 cyphesis_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive cyphesis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_cyphesis_server_packets'($*)) dnl
+
+ corenet_send_cyphesis_server_packets($1)
+ corenet_receive_cyphesis_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive cyphesis_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_cyphesis_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_cyphesis_server_packets($1)
+ corenet_dontaudit_receive_cyphesis_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to cyphesis_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_cyphesis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_cyphesis_server_packets'($*)) dnl
+
+ gen_require(`
+ type cyphesis_server_packet_t;
+ ')
+
+ allow $1 cyphesis_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_cyphesis_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the daap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the daap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the daap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_daap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_daap_port'($*)) dnl
+
+ gen_require(`
+ type daap_port_t;
+ ')
+
+ allow $1 daap_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_daap_port'($*)) dnl
+
+ gen_require(`
+ type daap_port_t;
+ ')
+
+ allow $1 daap_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_daap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the daap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_daap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_daap_port'($*)) dnl
+
+ gen_require(`
+ type daap_port_t;
+ ')
+
+ allow $1 daap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_daap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send daap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_daap_client_packets'($*)) dnl
+
+ gen_require(`
+ type daap_client_packet_t;
+ ')
+
+ allow $1 daap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send daap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_daap_client_packets'($*)) dnl
+
+ gen_require(`
+ type daap_client_packet_t;
+ ')
+
+ dontaudit $1 daap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive daap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_daap_client_packets'($*)) dnl
+
+ gen_require(`
+ type daap_client_packet_t;
+ ')
+
+ allow $1 daap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive daap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_daap_client_packets'($*)) dnl
+
+ gen_require(`
+ type daap_client_packet_t;
+ ')
+
+ dontaudit $1 daap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive daap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_daap_client_packets'($*)) dnl
+
+ corenet_send_daap_client_packets($1)
+ corenet_receive_daap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive daap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_daap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_daap_client_packets($1)
+ corenet_dontaudit_receive_daap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_daap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to daap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_daap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_daap_client_packets'($*)) dnl
+
+ gen_require(`
+ type daap_client_packet_t;
+ ')
+
+ allow $1 daap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_daap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send daap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_daap_server_packets'($*)) dnl
+
+ gen_require(`
+ type daap_server_packet_t;
+ ')
+
+ allow $1 daap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send daap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_daap_server_packets'($*)) dnl
+
+ gen_require(`
+ type daap_server_packet_t;
+ ')
+
+ dontaudit $1 daap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive daap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_daap_server_packets'($*)) dnl
+
+ gen_require(`
+ type daap_server_packet_t;
+ ')
+
+ allow $1 daap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive daap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_daap_server_packets'($*)) dnl
+
+ gen_require(`
+ type daap_server_packet_t;
+ ')
+
+ dontaudit $1 daap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive daap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_daap_server_packets'($*)) dnl
+
+ corenet_send_daap_server_packets($1)
+ corenet_receive_daap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive daap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_daap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_daap_server_packets($1)
+ corenet_dontaudit_receive_daap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_daap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to daap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_daap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_daap_server_packets'($*)) dnl
+
+ gen_require(`
+ type daap_server_packet_t;
+ ')
+
+ allow $1 daap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_daap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dbskkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dbskkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dbskkd_port'($*)) dnl
+
+ gen_require(`
+ type dbskkd_port_t;
+ ')
+
+ allow $1 dbskkd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dbskkd_port'($*)) dnl
+
+ gen_require(`
+ type dbskkd_port_t;
+ ')
+
+ allow $1 dbskkd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dbskkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dbskkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dbskkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dbskkd_port'($*)) dnl
+
+ gen_require(`
+ type dbskkd_port_t;
+ ')
+
+ allow $1 dbskkd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dbskkd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dbskkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dbskkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_client_packet_t;
+ ')
+
+ allow $1 dbskkd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dbskkd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dbskkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_client_packet_t;
+ ')
+
+ dontaudit $1 dbskkd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dbskkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dbskkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_client_packet_t;
+ ')
+
+ allow $1 dbskkd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dbskkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dbskkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_client_packet_t;
+ ')
+
+ dontaudit $1 dbskkd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dbskkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dbskkd_client_packets'($*)) dnl
+
+ corenet_send_dbskkd_client_packets($1)
+ corenet_receive_dbskkd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dbskkd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dbskkd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dbskkd_client_packets($1)
+ corenet_dontaudit_receive_dbskkd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dbskkd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dbskkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dbskkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_client_packet_t;
+ ')
+
+ allow $1 dbskkd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dbskkd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dbskkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dbskkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_server_packet_t;
+ ')
+
+ allow $1 dbskkd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dbskkd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dbskkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_server_packet_t;
+ ')
+
+ dontaudit $1 dbskkd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dbskkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dbskkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_server_packet_t;
+ ')
+
+ allow $1 dbskkd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dbskkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dbskkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_server_packet_t;
+ ')
+
+ dontaudit $1 dbskkd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dbskkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dbskkd_server_packets'($*)) dnl
+
+ corenet_send_dbskkd_server_packets($1)
+ corenet_receive_dbskkd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dbskkd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dbskkd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dbskkd_server_packets($1)
+ corenet_dontaudit_receive_dbskkd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dbskkd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dbskkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dbskkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dbskkd_server_packet_t;
+ ')
+
+ allow $1 dbskkd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dbskkd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dcc_port'($*)) dnl
+
+ gen_require(`
+ type dcc_port_t;
+ ')
+
+ allow $1 dcc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dcc_port'($*)) dnl
+
+ gen_require(`
+ type dcc_port_t;
+ ')
+
+ allow $1 dcc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dcc_port'($*)) dnl
+
+ gen_require(`
+ type dcc_port_t;
+ ')
+
+ allow $1 dcc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dcc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_client_packet_t;
+ ')
+
+ allow $1 dcc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dcc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_client_packet_t;
+ ')
+
+ dontaudit $1 dcc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_client_packet_t;
+ ')
+
+ allow $1 dcc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_client_packet_t;
+ ')
+
+ dontaudit $1 dcc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dcc_client_packets'($*)) dnl
+
+ corenet_send_dcc_client_packets($1)
+ corenet_receive_dcc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dcc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dcc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dcc_client_packets($1)
+ corenet_dontaudit_receive_dcc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dcc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_client_packet_t;
+ ')
+
+ allow $1 dcc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dcc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_server_packet_t;
+ ')
+
+ allow $1 dcc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dcc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_server_packet_t;
+ ')
+
+ dontaudit $1 dcc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_server_packet_t;
+ ')
+
+ allow $1 dcc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_server_packet_t;
+ ')
+
+ dontaudit $1 dcc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dcc_server_packets'($*)) dnl
+
+ corenet_send_dcc_server_packets($1)
+ corenet_receive_dcc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dcc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dcc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dcc_server_packets($1)
+ corenet_dontaudit_receive_dcc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dcc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dcc_server_packet_t;
+ ')
+
+ allow $1 dcc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dcc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dccm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dccm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dccm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dccm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dccm_port'($*)) dnl
+
+ gen_require(`
+ type dccm_port_t;
+ ')
+
+ allow $1 dccm_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dccm_port'($*)) dnl
+
+ gen_require(`
+ type dccm_port_t;
+ ')
+
+ allow $1 dccm_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dccm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dccm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dccm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dccm_port'($*)) dnl
+
+ gen_require(`
+ type dccm_port_t;
+ ')
+
+ allow $1 dccm_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dccm_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dccm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dccm_client_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_client_packet_t;
+ ')
+
+ allow $1 dccm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dccm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dccm_client_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_client_packet_t;
+ ')
+
+ dontaudit $1 dccm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dccm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dccm_client_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_client_packet_t;
+ ')
+
+ allow $1 dccm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dccm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dccm_client_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_client_packet_t;
+ ')
+
+ dontaudit $1 dccm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dccm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dccm_client_packets'($*)) dnl
+
+ corenet_send_dccm_client_packets($1)
+ corenet_receive_dccm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dccm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dccm_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dccm_client_packets($1)
+ corenet_dontaudit_receive_dccm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dccm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dccm_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dccm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dccm_client_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_client_packet_t;
+ ')
+
+ allow $1 dccm_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dccm_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dccm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dccm_server_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_server_packet_t;
+ ')
+
+ allow $1 dccm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dccm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dccm_server_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_server_packet_t;
+ ')
+
+ dontaudit $1 dccm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dccm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dccm_server_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_server_packet_t;
+ ')
+
+ allow $1 dccm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dccm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dccm_server_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_server_packet_t;
+ ')
+
+ dontaudit $1 dccm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dccm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dccm_server_packets'($*)) dnl
+
+ corenet_send_dccm_server_packets($1)
+ corenet_receive_dccm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dccm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dccm_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dccm_server_packets($1)
+ corenet_dontaudit_receive_dccm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dccm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dccm_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dccm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dccm_server_packets'($*)) dnl
+
+ gen_require(`
+ type dccm_server_packet_t;
+ ')
+
+ allow $1 dccm_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dccm_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dhcpc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dhcpc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dhcpc_port'($*)) dnl
+
+ gen_require(`
+ type dhcpc_port_t;
+ ')
+
+ allow $1 dhcpc_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dhcpc_port'($*)) dnl
+
+ gen_require(`
+ type dhcpc_port_t;
+ ')
+
+ allow $1 dhcpc_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dhcpc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dhcpc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dhcpc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dhcpc_port'($*)) dnl
+
+ gen_require(`
+ type dhcpc_port_t;
+ ')
+
+ allow $1 dhcpc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dhcpc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dhcpc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_client_packet_t;
+ ')
+
+ allow $1 dhcpc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dhcpc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_client_packet_t;
+ ')
+
+ dontaudit $1 dhcpc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dhcpc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_client_packet_t;
+ ')
+
+ allow $1 dhcpc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dhcpc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_client_packet_t;
+ ')
+
+ dontaudit $1 dhcpc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dhcpc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpc_client_packets'($*)) dnl
+
+ corenet_send_dhcpc_client_packets($1)
+ corenet_receive_dhcpc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dhcpc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dhcpc_client_packets($1)
+ corenet_dontaudit_receive_dhcpc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dhcpc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dhcpc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpc_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_client_packet_t;
+ ')
+
+ allow $1 dhcpc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dhcpc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_server_packet_t;
+ ')
+
+ allow $1 dhcpc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dhcpc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_server_packet_t;
+ ')
+
+ dontaudit $1 dhcpc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dhcpc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_server_packet_t;
+ ')
+
+ allow $1 dhcpc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dhcpc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_server_packet_t;
+ ')
+
+ dontaudit $1 dhcpc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dhcpc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpc_server_packets'($*)) dnl
+
+ corenet_send_dhcpc_server_packets($1)
+ corenet_receive_dhcpc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dhcpc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dhcpc_server_packets($1)
+ corenet_dontaudit_receive_dhcpc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dhcpc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dhcpc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpc_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpc_server_packet_t;
+ ')
+
+ allow $1 dhcpc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dhcpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dhcpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dhcpd_port'($*)) dnl
+
+ gen_require(`
+ type dhcpd_port_t;
+ ')
+
+ allow $1 dhcpd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dhcpd_port'($*)) dnl
+
+ gen_require(`
+ type dhcpd_port_t;
+ ')
+
+ allow $1 dhcpd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dhcpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dhcpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dhcpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dhcpd_port'($*)) dnl
+
+ gen_require(`
+ type dhcpd_port_t;
+ ')
+
+ allow $1 dhcpd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dhcpd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dhcpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_client_packet_t;
+ ')
+
+ allow $1 dhcpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dhcpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_client_packet_t;
+ ')
+
+ dontaudit $1 dhcpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dhcpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_client_packet_t;
+ ')
+
+ allow $1 dhcpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dhcpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_client_packet_t;
+ ')
+
+ dontaudit $1 dhcpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dhcpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpd_client_packets'($*)) dnl
+
+ corenet_send_dhcpd_client_packets($1)
+ corenet_receive_dhcpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dhcpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dhcpd_client_packets($1)
+ corenet_dontaudit_receive_dhcpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dhcpd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dhcpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_client_packet_t;
+ ')
+
+ allow $1 dhcpd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dhcpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dhcpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_server_packet_t;
+ ')
+
+ allow $1 dhcpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dhcpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dhcpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_server_packet_t;
+ ')
+
+ dontaudit $1 dhcpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dhcpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dhcpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_server_packet_t;
+ ')
+
+ allow $1 dhcpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dhcpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dhcpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_server_packet_t;
+ ')
+
+ dontaudit $1 dhcpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dhcpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dhcpd_server_packets'($*)) dnl
+
+ corenet_send_dhcpd_server_packets($1)
+ corenet_receive_dhcpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dhcpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dhcpd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dhcpd_server_packets($1)
+ corenet_dontaudit_receive_dhcpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dhcpd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dhcpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dhcpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type dhcpd_server_packet_t;
+ ')
+
+ allow $1 dhcpd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dhcpd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dict port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dict port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dict port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dict_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dict_port'($*)) dnl
+
+ gen_require(`
+ type dict_port_t;
+ ')
+
+ allow $1 dict_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dict_port'($*)) dnl
+
+ gen_require(`
+ type dict_port_t;
+ ')
+
+ allow $1 dict_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dict_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dict port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dict_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dict_port'($*)) dnl
+
+ gen_require(`
+ type dict_port_t;
+ ')
+
+ allow $1 dict_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dict_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dict_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dict_client_packets'($*)) dnl
+
+ gen_require(`
+ type dict_client_packet_t;
+ ')
+
+ allow $1 dict_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dict_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dict_client_packets'($*)) dnl
+
+ gen_require(`
+ type dict_client_packet_t;
+ ')
+
+ dontaudit $1 dict_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dict_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dict_client_packets'($*)) dnl
+
+ gen_require(`
+ type dict_client_packet_t;
+ ')
+
+ allow $1 dict_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dict_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dict_client_packets'($*)) dnl
+
+ gen_require(`
+ type dict_client_packet_t;
+ ')
+
+ dontaudit $1 dict_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dict_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dict_client_packets'($*)) dnl
+
+ corenet_send_dict_client_packets($1)
+ corenet_receive_dict_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dict_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dict_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dict_client_packets($1)
+ corenet_dontaudit_receive_dict_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dict_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dict_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dict_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dict_client_packets'($*)) dnl
+
+ gen_require(`
+ type dict_client_packet_t;
+ ')
+
+ allow $1 dict_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dict_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dict_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dict_server_packets'($*)) dnl
+
+ gen_require(`
+ type dict_server_packet_t;
+ ')
+
+ allow $1 dict_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dict_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dict_server_packets'($*)) dnl
+
+ gen_require(`
+ type dict_server_packet_t;
+ ')
+
+ dontaudit $1 dict_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dict_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dict_server_packets'($*)) dnl
+
+ gen_require(`
+ type dict_server_packet_t;
+ ')
+
+ allow $1 dict_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dict_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dict_server_packets'($*)) dnl
+
+ gen_require(`
+ type dict_server_packet_t;
+ ')
+
+ dontaudit $1 dict_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dict_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dict_server_packets'($*)) dnl
+
+ corenet_send_dict_server_packets($1)
+ corenet_receive_dict_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dict_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dict_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dict_server_packets($1)
+ corenet_dontaudit_receive_dict_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dict_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dict_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dict_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dict_server_packets'($*)) dnl
+
+ gen_require(`
+ type dict_server_packet_t;
+ ')
+
+ allow $1 dict_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dict_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the distccd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the distccd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the distccd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_distccd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_distccd_port'($*)) dnl
+
+ gen_require(`
+ type distccd_port_t;
+ ')
+
+ allow $1 distccd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_distccd_port'($*)) dnl
+
+ gen_require(`
+ type distccd_port_t;
+ ')
+
+ allow $1 distccd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_distccd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the distccd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_distccd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_distccd_port'($*)) dnl
+
+ gen_require(`
+ type distccd_port_t;
+ ')
+
+ allow $1 distccd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_distccd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send distccd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_distccd_client_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_client_packet_t;
+ ')
+
+ allow $1 distccd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send distccd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_distccd_client_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_client_packet_t;
+ ')
+
+ dontaudit $1 distccd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive distccd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_distccd_client_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_client_packet_t;
+ ')
+
+ allow $1 distccd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive distccd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_distccd_client_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_client_packet_t;
+ ')
+
+ dontaudit $1 distccd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive distccd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_distccd_client_packets'($*)) dnl
+
+ corenet_send_distccd_client_packets($1)
+ corenet_receive_distccd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive distccd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_distccd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_distccd_client_packets($1)
+ corenet_dontaudit_receive_distccd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_distccd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to distccd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_distccd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_distccd_client_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_client_packet_t;
+ ')
+
+ allow $1 distccd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_distccd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send distccd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_distccd_server_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_server_packet_t;
+ ')
+
+ allow $1 distccd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send distccd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_distccd_server_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_server_packet_t;
+ ')
+
+ dontaudit $1 distccd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive distccd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_distccd_server_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_server_packet_t;
+ ')
+
+ allow $1 distccd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive distccd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_distccd_server_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_server_packet_t;
+ ')
+
+ dontaudit $1 distccd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive distccd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_distccd_server_packets'($*)) dnl
+
+ corenet_send_distccd_server_packets($1)
+ corenet_receive_distccd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive distccd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_distccd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_distccd_server_packets($1)
+ corenet_dontaudit_receive_distccd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_distccd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to distccd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_distccd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_distccd_server_packets'($*)) dnl
+
+ gen_require(`
+ type distccd_server_packet_t;
+ ')
+
+ allow $1 distccd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_distccd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dns_port'($*)) dnl
+
+ gen_require(`
+ type dns_port_t;
+ ')
+
+ allow $1 dns_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dns_port'($*)) dnl
+
+ gen_require(`
+ type dns_port_t;
+ ')
+
+ allow $1 dns_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dns_port'($*)) dnl
+
+ gen_require(`
+ type dns_port_t;
+ ')
+
+ allow $1 dns_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dns_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dns_client_packets'($*)) dnl
+
+ gen_require(`
+ type dns_client_packet_t;
+ ')
+
+ allow $1 dns_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dns_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dns_client_packets'($*)) dnl
+
+ gen_require(`
+ type dns_client_packet_t;
+ ')
+
+ dontaudit $1 dns_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dns_client_packets'($*)) dnl
+
+ gen_require(`
+ type dns_client_packet_t;
+ ')
+
+ allow $1 dns_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dns_client_packets'($*)) dnl
+
+ gen_require(`
+ type dns_client_packet_t;
+ ')
+
+ dontaudit $1 dns_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dns_client_packets'($*)) dnl
+
+ corenet_send_dns_client_packets($1)
+ corenet_receive_dns_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dns_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dns_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dns_client_packets($1)
+ corenet_dontaudit_receive_dns_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dns_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dns_client_packets'($*)) dnl
+
+ gen_require(`
+ type dns_client_packet_t;
+ ')
+
+ allow $1 dns_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dns_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dns_server_packets'($*)) dnl
+
+ gen_require(`
+ type dns_server_packet_t;
+ ')
+
+ allow $1 dns_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dns_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dns_server_packets'($*)) dnl
+
+ gen_require(`
+ type dns_server_packet_t;
+ ')
+
+ dontaudit $1 dns_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dns_server_packets'($*)) dnl
+
+ gen_require(`
+ type dns_server_packet_t;
+ ')
+
+ allow $1 dns_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dns_server_packets'($*)) dnl
+
+ gen_require(`
+ type dns_server_packet_t;
+ ')
+
+ dontaudit $1 dns_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dns_server_packets'($*)) dnl
+
+ corenet_send_dns_server_packets($1)
+ corenet_receive_dns_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dns_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dns_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dns_server_packets($1)
+ corenet_dontaudit_receive_dns_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dns_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dns_server_packets'($*)) dnl
+
+ gen_require(`
+ type dns_server_packet_t;
+ ')
+
+ allow $1 dns_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dns_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the dropbox port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the dropbox port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the dropbox port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_dropbox_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_dropbox_port'($*)) dnl
+
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_dropbox_port'($*)) dnl
+
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_dropbox_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the dropbox port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_dropbox_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_dropbox_port'($*)) dnl
+
+ gen_require(`
+ type dropbox_port_t;
+ ')
+
+ allow $1 dropbox_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_dropbox_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dropbox_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dropbox_client_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dropbox_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dropbox_client_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ dontaudit $1 dropbox_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dropbox_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dropbox_client_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dropbox_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dropbox_client_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ dontaudit $1 dropbox_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dropbox_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dropbox_client_packets'($*)) dnl
+
+ corenet_send_dropbox_client_packets($1)
+ corenet_receive_dropbox_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dropbox_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dropbox_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_dropbox_client_packets($1)
+ corenet_dontaudit_receive_dropbox_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dropbox_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dropbox_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dropbox_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dropbox_client_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_client_packet_t;
+ ')
+
+ allow $1 dropbox_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dropbox_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send dropbox_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_dropbox_server_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send dropbox_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_dropbox_server_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ dontaudit $1 dropbox_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive dropbox_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_dropbox_server_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive dropbox_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_dropbox_server_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ dontaudit $1 dropbox_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive dropbox_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_dropbox_server_packets'($*)) dnl
+
+ corenet_send_dropbox_server_packets($1)
+ corenet_receive_dropbox_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive dropbox_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_dropbox_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_dropbox_server_packets($1)
+ corenet_dontaudit_receive_dropbox_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_dropbox_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to dropbox_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_dropbox_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_dropbox_server_packets'($*)) dnl
+
+ gen_require(`
+ type dropbox_server_packet_t;
+ ')
+
+ allow $1 dropbox_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_dropbox_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the efs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the efs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the efs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_efs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_efs_port'($*)) dnl
+
+ gen_require(`
+ type efs_port_t;
+ ')
+
+ allow $1 efs_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_efs_port'($*)) dnl
+
+ gen_require(`
+ type efs_port_t;
+ ')
+
+ allow $1 efs_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_efs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the efs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_efs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_efs_port'($*)) dnl
+
+ gen_require(`
+ type efs_port_t;
+ ')
+
+ allow $1 efs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_efs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send efs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_efs_client_packets'($*)) dnl
+
+ gen_require(`
+ type efs_client_packet_t;
+ ')
+
+ allow $1 efs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send efs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_efs_client_packets'($*)) dnl
+
+ gen_require(`
+ type efs_client_packet_t;
+ ')
+
+ dontaudit $1 efs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive efs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_efs_client_packets'($*)) dnl
+
+ gen_require(`
+ type efs_client_packet_t;
+ ')
+
+ allow $1 efs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive efs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_efs_client_packets'($*)) dnl
+
+ gen_require(`
+ type efs_client_packet_t;
+ ')
+
+ dontaudit $1 efs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive efs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_efs_client_packets'($*)) dnl
+
+ corenet_send_efs_client_packets($1)
+ corenet_receive_efs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive efs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_efs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_efs_client_packets($1)
+ corenet_dontaudit_receive_efs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_efs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to efs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_efs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_efs_client_packets'($*)) dnl
+
+ gen_require(`
+ type efs_client_packet_t;
+ ')
+
+ allow $1 efs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_efs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send efs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_efs_server_packets'($*)) dnl
+
+ gen_require(`
+ type efs_server_packet_t;
+ ')
+
+ allow $1 efs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send efs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_efs_server_packets'($*)) dnl
+
+ gen_require(`
+ type efs_server_packet_t;
+ ')
+
+ dontaudit $1 efs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive efs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_efs_server_packets'($*)) dnl
+
+ gen_require(`
+ type efs_server_packet_t;
+ ')
+
+ allow $1 efs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive efs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_efs_server_packets'($*)) dnl
+
+ gen_require(`
+ type efs_server_packet_t;
+ ')
+
+ dontaudit $1 efs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive efs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_efs_server_packets'($*)) dnl
+
+ corenet_send_efs_server_packets($1)
+ corenet_receive_efs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive efs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_efs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_efs_server_packets($1)
+ corenet_dontaudit_receive_efs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_efs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to efs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_efs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_efs_server_packets'($*)) dnl
+
+ gen_require(`
+ type efs_server_packet_t;
+ ')
+
+ allow $1 efs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_efs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the embrace_dp_c port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_embrace_dp_c_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_embrace_dp_c_port'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_port_t;
+ ')
+
+ allow $1 embrace_dp_c_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_embrace_dp_c_port'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_port_t;
+ ')
+
+ allow $1 embrace_dp_c_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the embrace_dp_c port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_embrace_dp_c_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_embrace_dp_c_port'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_port_t;
+ ')
+
+ allow $1 embrace_dp_c_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_embrace_dp_c_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send embrace_dp_c_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_embrace_dp_c_client_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_client_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send embrace_dp_c_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_embrace_dp_c_client_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_client_packet_t;
+ ')
+
+ dontaudit $1 embrace_dp_c_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive embrace_dp_c_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_embrace_dp_c_client_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_client_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive embrace_dp_c_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_embrace_dp_c_client_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_client_packet_t;
+ ')
+
+ dontaudit $1 embrace_dp_c_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive embrace_dp_c_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_embrace_dp_c_client_packets'($*)) dnl
+
+ corenet_send_embrace_dp_c_client_packets($1)
+ corenet_receive_embrace_dp_c_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive embrace_dp_c_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_embrace_dp_c_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_embrace_dp_c_client_packets($1)
+ corenet_dontaudit_receive_embrace_dp_c_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to embrace_dp_c_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_embrace_dp_c_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_embrace_dp_c_client_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_client_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_embrace_dp_c_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send embrace_dp_c_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_embrace_dp_c_server_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_server_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send embrace_dp_c_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_embrace_dp_c_server_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_server_packet_t;
+ ')
+
+ dontaudit $1 embrace_dp_c_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive embrace_dp_c_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_embrace_dp_c_server_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_server_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive embrace_dp_c_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_embrace_dp_c_server_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_server_packet_t;
+ ')
+
+ dontaudit $1 embrace_dp_c_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive embrace_dp_c_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_embrace_dp_c_server_packets'($*)) dnl
+
+ corenet_send_embrace_dp_c_server_packets($1)
+ corenet_receive_embrace_dp_c_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive embrace_dp_c_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_embrace_dp_c_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_embrace_dp_c_server_packets($1)
+ corenet_dontaudit_receive_embrace_dp_c_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to embrace_dp_c_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_embrace_dp_c_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_embrace_dp_c_server_packets'($*)) dnl
+
+ gen_require(`
+ type embrace_dp_c_server_packet_t;
+ ')
+
+ allow $1 embrace_dp_c_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_embrace_dp_c_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the epmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the epmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the epmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_epmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_epmap_port'($*)) dnl
+
+ gen_require(`
+ type epmap_port_t;
+ ')
+
+ allow $1 epmap_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_epmap_port'($*)) dnl
+
+ gen_require(`
+ type epmap_port_t;
+ ')
+
+ allow $1 epmap_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_epmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the epmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_epmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_epmap_port'($*)) dnl
+
+ gen_require(`
+ type epmap_port_t;
+ ')
+
+ allow $1 epmap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_epmap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send epmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_epmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_client_packet_t;
+ ')
+
+ allow $1 epmap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send epmap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_client_packet_t;
+ ')
+
+ dontaudit $1 epmap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive epmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_epmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_client_packet_t;
+ ')
+
+ allow $1 epmap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive epmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_client_packet_t;
+ ')
+
+ dontaudit $1 epmap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive epmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmap_client_packets'($*)) dnl
+
+ corenet_send_epmap_client_packets($1)
+ corenet_receive_epmap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive epmap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_epmap_client_packets($1)
+ corenet_dontaudit_receive_epmap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to epmap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_epmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_client_packet_t;
+ ')
+
+ allow $1 epmap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send epmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_epmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_server_packet_t;
+ ')
+
+ allow $1 epmap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send epmap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_server_packet_t;
+ ')
+
+ dontaudit $1 epmap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive epmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_epmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_server_packet_t;
+ ')
+
+ allow $1 epmap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive epmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_server_packet_t;
+ ')
+
+ dontaudit $1 epmap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive epmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmap_server_packets'($*)) dnl
+
+ corenet_send_epmap_server_packets($1)
+ corenet_receive_epmap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive epmap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_epmap_server_packets($1)
+ corenet_dontaudit_receive_epmap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to epmap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_epmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmap_server_packet_t;
+ ')
+
+ allow $1 epmap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the epmd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the epmd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the epmd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_epmd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_epmd_port'($*)) dnl
+
+ gen_require(`
+ type epmd_port_t;
+ ')
+
+ allow $1 epmd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_epmd_port'($*)) dnl
+
+ gen_require(`
+ type epmd_port_t;
+ ')
+
+ allow $1 epmd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_epmd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the epmd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_epmd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_epmd_port'($*)) dnl
+
+ gen_require(`
+ type epmd_port_t;
+ ')
+
+ allow $1 epmd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_epmd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send epmd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_epmd_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_client_packet_t;
+ ')
+
+ allow $1 epmd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send epmd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmd_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_client_packet_t;
+ ')
+
+ dontaudit $1 epmd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive epmd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_epmd_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_client_packet_t;
+ ')
+
+ allow $1 epmd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive epmd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmd_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_client_packet_t;
+ ')
+
+ dontaudit $1 epmd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive epmd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmd_client_packets'($*)) dnl
+
+ corenet_send_epmd_client_packets($1)
+ corenet_receive_epmd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive epmd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_epmd_client_packets($1)
+ corenet_dontaudit_receive_epmd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to epmd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_epmd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmd_client_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_client_packet_t;
+ ')
+
+ allow $1 epmd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send epmd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_epmd_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_server_packet_t;
+ ')
+
+ allow $1 epmd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send epmd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_epmd_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_server_packet_t;
+ ')
+
+ dontaudit $1 epmd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive epmd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_epmd_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_server_packet_t;
+ ')
+
+ allow $1 epmd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive epmd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_epmd_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_server_packet_t;
+ ')
+
+ dontaudit $1 epmd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive epmd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_epmd_server_packets'($*)) dnl
+
+ corenet_send_epmd_server_packets($1)
+ corenet_receive_epmd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive epmd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_epmd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_epmd_server_packets($1)
+ corenet_dontaudit_receive_epmd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_epmd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to epmd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_epmd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_epmd_server_packets'($*)) dnl
+
+ gen_require(`
+ type epmd_server_packet_t;
+ ')
+
+ allow $1 epmd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_epmd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the fingerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the fingerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the fingerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_fingerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_fingerd_port'($*)) dnl
+
+ gen_require(`
+ type fingerd_port_t;
+ ')
+
+ allow $1 fingerd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_fingerd_port'($*)) dnl
+
+ gen_require(`
+ type fingerd_port_t;
+ ')
+
+ allow $1 fingerd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_fingerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the fingerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_fingerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_fingerd_port'($*)) dnl
+
+ gen_require(`
+ type fingerd_port_t;
+ ')
+
+ allow $1 fingerd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_fingerd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send fingerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_fingerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_client_packet_t;
+ ')
+
+ allow $1 fingerd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send fingerd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_fingerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_client_packet_t;
+ ')
+
+ dontaudit $1 fingerd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive fingerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_fingerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_client_packet_t;
+ ')
+
+ allow $1 fingerd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive fingerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_fingerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_client_packet_t;
+ ')
+
+ dontaudit $1 fingerd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive fingerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_fingerd_client_packets'($*)) dnl
+
+ corenet_send_fingerd_client_packets($1)
+ corenet_receive_fingerd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive fingerd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_fingerd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_fingerd_client_packets($1)
+ corenet_dontaudit_receive_fingerd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_fingerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to fingerd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_fingerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_fingerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_client_packet_t;
+ ')
+
+ allow $1 fingerd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_fingerd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send fingerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_fingerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_server_packet_t;
+ ')
+
+ allow $1 fingerd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send fingerd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_fingerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_server_packet_t;
+ ')
+
+ dontaudit $1 fingerd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive fingerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_fingerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_server_packet_t;
+ ')
+
+ allow $1 fingerd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive fingerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_fingerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_server_packet_t;
+ ')
+
+ dontaudit $1 fingerd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive fingerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_fingerd_server_packets'($*)) dnl
+
+ corenet_send_fingerd_server_packets($1)
+ corenet_receive_fingerd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive fingerd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_fingerd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_fingerd_server_packets($1)
+ corenet_dontaudit_receive_fingerd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_fingerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to fingerd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_fingerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_fingerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type fingerd_server_packet_t;
+ ')
+
+ allow $1 fingerd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_fingerd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ftp_port'($*)) dnl
+
+ gen_require(`
+ type ftp_port_t;
+ ')
+
+ allow $1 ftp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ftp_port'($*)) dnl
+
+ gen_require(`
+ type ftp_port_t;
+ ')
+
+ allow $1 ftp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ftp_port'($*)) dnl
+
+ gen_require(`
+ type ftp_port_t;
+ ')
+
+ allow $1 ftp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ftp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_client_packet_t;
+ ')
+
+ allow $1 ftp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ftp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_client_packet_t;
+ ')
+
+ dontaudit $1 ftp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_client_packet_t;
+ ')
+
+ allow $1 ftp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_client_packet_t;
+ ')
+
+ dontaudit $1 ftp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_client_packets'($*)) dnl
+
+ corenet_send_ftp_client_packets($1)
+ corenet_receive_ftp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ftp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ftp_client_packets($1)
+ corenet_dontaudit_receive_ftp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ftp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_client_packet_t;
+ ')
+
+ allow $1 ftp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_server_packet_t;
+ ')
+
+ allow $1 ftp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ftp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_server_packet_t;
+ ')
+
+ dontaudit $1 ftp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_server_packet_t;
+ ')
+
+ allow $1 ftp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_server_packet_t;
+ ')
+
+ dontaudit $1 ftp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_server_packets'($*)) dnl
+
+ corenet_send_ftp_server_packets($1)
+ corenet_receive_ftp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ftp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ftp_server_packets($1)
+ corenet_dontaudit_receive_ftp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ftp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_server_packet_t;
+ ')
+
+ allow $1 ftp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ftp_data port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ftp_data_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ftp_data_port'($*)) dnl
+
+ gen_require(`
+ type ftp_data_port_t;
+ ')
+
+ allow $1 ftp_data_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ftp_data_port'($*)) dnl
+
+ gen_require(`
+ type ftp_data_port_t;
+ ')
+
+ allow $1 ftp_data_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ftp_data_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ftp_data port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ftp_data_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ftp_data_port'($*)) dnl
+
+ gen_require(`
+ type ftp_data_port_t;
+ ')
+
+ allow $1 ftp_data_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ftp_data_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ftp_data_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_data_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_client_packet_t;
+ ')
+
+ allow $1 ftp_data_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ftp_data_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_data_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_client_packet_t;
+ ')
+
+ dontaudit $1 ftp_data_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ftp_data_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_data_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_client_packet_t;
+ ')
+
+ allow $1 ftp_data_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ftp_data_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_data_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_client_packet_t;
+ ')
+
+ dontaudit $1 ftp_data_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ftp_data_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_data_client_packets'($*)) dnl
+
+ corenet_send_ftp_data_client_packets($1)
+ corenet_receive_ftp_data_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ftp_data_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_data_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ftp_data_client_packets($1)
+ corenet_dontaudit_receive_ftp_data_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ftp_data_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ftp_data_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_data_client_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_client_packet_t;
+ ')
+
+ allow $1 ftp_data_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_data_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ftp_data_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ftp_data_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_server_packet_t;
+ ')
+
+ allow $1 ftp_data_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ftp_data_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ftp_data_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_server_packet_t;
+ ')
+
+ dontaudit $1 ftp_data_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ftp_data_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ftp_data_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_server_packet_t;
+ ')
+
+ allow $1 ftp_data_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ftp_data_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ftp_data_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_server_packet_t;
+ ')
+
+ dontaudit $1 ftp_data_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ftp_data_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ftp_data_server_packets'($*)) dnl
+
+ corenet_send_ftp_data_server_packets($1)
+ corenet_receive_ftp_data_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ftp_data_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ftp_data_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ftp_data_server_packets($1)
+ corenet_dontaudit_receive_ftp_data_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ftp_data_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ftp_data_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ftp_data_server_packets'($*)) dnl
+
+ gen_require(`
+ type ftp_data_server_packet_t;
+ ')
+
+ allow $1 ftp_data_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ftp_data_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the gatekeeper port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gatekeeper_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gatekeeper_port'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_port_t;
+ ')
+
+ allow $1 gatekeeper_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gatekeeper_port'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_port_t;
+ ')
+
+ allow $1 gatekeeper_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gatekeeper_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the gatekeeper port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_gatekeeper_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gatekeeper_port'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_port_t;
+ ')
+
+ allow $1 gatekeeper_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gatekeeper_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gatekeeper_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gatekeeper_client_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_client_packet_t;
+ ')
+
+ allow $1 gatekeeper_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gatekeeper_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gatekeeper_client_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_client_packet_t;
+ ')
+
+ dontaudit $1 gatekeeper_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gatekeeper_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gatekeeper_client_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_client_packet_t;
+ ')
+
+ allow $1 gatekeeper_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gatekeeper_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gatekeeper_client_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_client_packet_t;
+ ')
+
+ dontaudit $1 gatekeeper_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gatekeeper_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gatekeeper_client_packets'($*)) dnl
+
+ corenet_send_gatekeeper_client_packets($1)
+ corenet_receive_gatekeeper_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gatekeeper_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gatekeeper_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_gatekeeper_client_packets($1)
+ corenet_dontaudit_receive_gatekeeper_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gatekeeper_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gatekeeper_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gatekeeper_client_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_client_packet_t;
+ ')
+
+ allow $1 gatekeeper_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gatekeeper_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gatekeeper_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gatekeeper_server_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_server_packet_t;
+ ')
+
+ allow $1 gatekeeper_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gatekeeper_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gatekeeper_server_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_server_packet_t;
+ ')
+
+ dontaudit $1 gatekeeper_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gatekeeper_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gatekeeper_server_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_server_packet_t;
+ ')
+
+ allow $1 gatekeeper_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gatekeeper_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gatekeeper_server_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_server_packet_t;
+ ')
+
+ dontaudit $1 gatekeeper_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gatekeeper_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gatekeeper_server_packets'($*)) dnl
+
+ corenet_send_gatekeeper_server_packets($1)
+ corenet_receive_gatekeeper_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gatekeeper_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gatekeeper_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_gatekeeper_server_packets($1)
+ corenet_dontaudit_receive_gatekeeper_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gatekeeper_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gatekeeper_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gatekeeper_server_packets'($*)) dnl
+
+ gen_require(`
+ type gatekeeper_server_packet_t;
+ ')
+
+ allow $1 gatekeeper_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gatekeeper_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the gdomap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the gdomap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the gdomap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gdomap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gdomap_port'($*)) dnl
+
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gdomap_port'($*)) dnl
+
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gdomap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the gdomap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_gdomap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gdomap_port'($*)) dnl
+
+ gen_require(`
+ type gdomap_port_t;
+ ')
+
+ allow $1 gdomap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gdomap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gdomap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gdomap_client_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gdomap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gdomap_client_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ dontaudit $1 gdomap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gdomap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gdomap_client_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gdomap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gdomap_client_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ dontaudit $1 gdomap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gdomap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gdomap_client_packets'($*)) dnl
+
+ corenet_send_gdomap_client_packets($1)
+ corenet_receive_gdomap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gdomap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gdomap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_gdomap_client_packets($1)
+ corenet_dontaudit_receive_gdomap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gdomap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gdomap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gdomap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gdomap_client_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_client_packet_t;
+ ')
+
+ allow $1 gdomap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gdomap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gdomap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gdomap_server_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gdomap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gdomap_server_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ dontaudit $1 gdomap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gdomap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gdomap_server_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gdomap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gdomap_server_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ dontaudit $1 gdomap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gdomap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gdomap_server_packets'($*)) dnl
+
+ corenet_send_gdomap_server_packets($1)
+ corenet_receive_gdomap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gdomap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gdomap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_gdomap_server_packets($1)
+ corenet_dontaudit_receive_gdomap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gdomap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gdomap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gdomap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gdomap_server_packets'($*)) dnl
+
+ gen_require(`
+ type gdomap_server_packet_t;
+ ')
+
+ allow $1 gdomap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gdomap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the gds_db port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the gds_db port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the gds_db port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gds_db_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gds_db_port'($*)) dnl
+
+ gen_require(`
+ type gds_db_port_t;
+ ')
+
+ allow $1 gds_db_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gds_db_port'($*)) dnl
+
+ gen_require(`
+ type gds_db_port_t;
+ ')
+
+ allow $1 gds_db_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gds_db_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the gds_db port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_gds_db_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gds_db_port'($*)) dnl
+
+ gen_require(`
+ type gds_db_port_t;
+ ')
+
+ allow $1 gds_db_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gds_db_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gds_db_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gds_db_client_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_client_packet_t;
+ ')
+
+ allow $1 gds_db_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gds_db_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gds_db_client_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_client_packet_t;
+ ')
+
+ dontaudit $1 gds_db_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gds_db_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gds_db_client_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_client_packet_t;
+ ')
+
+ allow $1 gds_db_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gds_db_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gds_db_client_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_client_packet_t;
+ ')
+
+ dontaudit $1 gds_db_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gds_db_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gds_db_client_packets'($*)) dnl
+
+ corenet_send_gds_db_client_packets($1)
+ corenet_receive_gds_db_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gds_db_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gds_db_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_gds_db_client_packets($1)
+ corenet_dontaudit_receive_gds_db_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gds_db_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gds_db_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gds_db_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gds_db_client_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_client_packet_t;
+ ')
+
+ allow $1 gds_db_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gds_db_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gds_db_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gds_db_server_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_server_packet_t;
+ ')
+
+ allow $1 gds_db_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gds_db_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gds_db_server_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_server_packet_t;
+ ')
+
+ dontaudit $1 gds_db_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gds_db_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gds_db_server_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_server_packet_t;
+ ')
+
+ allow $1 gds_db_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gds_db_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gds_db_server_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_server_packet_t;
+ ')
+
+ dontaudit $1 gds_db_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gds_db_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gds_db_server_packets'($*)) dnl
+
+ corenet_send_gds_db_server_packets($1)
+ corenet_receive_gds_db_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gds_db_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gds_db_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_gds_db_server_packets($1)
+ corenet_dontaudit_receive_gds_db_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gds_db_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gds_db_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gds_db_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gds_db_server_packets'($*)) dnl
+
+ gen_require(`
+ type gds_db_server_packet_t;
+ ')
+
+ allow $1 gds_db_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gds_db_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the giftd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the giftd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the giftd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_giftd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_giftd_port'($*)) dnl
+
+ gen_require(`
+ type giftd_port_t;
+ ')
+
+ allow $1 giftd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_giftd_port'($*)) dnl
+
+ gen_require(`
+ type giftd_port_t;
+ ')
+
+ allow $1 giftd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_giftd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the giftd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_giftd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_giftd_port'($*)) dnl
+
+ gen_require(`
+ type giftd_port_t;
+ ')
+
+ allow $1 giftd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_giftd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send giftd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_giftd_client_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_client_packet_t;
+ ')
+
+ allow $1 giftd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send giftd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_giftd_client_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_client_packet_t;
+ ')
+
+ dontaudit $1 giftd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive giftd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_giftd_client_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_client_packet_t;
+ ')
+
+ allow $1 giftd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive giftd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_giftd_client_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_client_packet_t;
+ ')
+
+ dontaudit $1 giftd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive giftd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_giftd_client_packets'($*)) dnl
+
+ corenet_send_giftd_client_packets($1)
+ corenet_receive_giftd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive giftd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_giftd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_giftd_client_packets($1)
+ corenet_dontaudit_receive_giftd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_giftd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to giftd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_giftd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_giftd_client_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_client_packet_t;
+ ')
+
+ allow $1 giftd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_giftd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send giftd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_giftd_server_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_server_packet_t;
+ ')
+
+ allow $1 giftd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send giftd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_giftd_server_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_server_packet_t;
+ ')
+
+ dontaudit $1 giftd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive giftd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_giftd_server_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_server_packet_t;
+ ')
+
+ allow $1 giftd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive giftd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_giftd_server_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_server_packet_t;
+ ')
+
+ dontaudit $1 giftd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive giftd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_giftd_server_packets'($*)) dnl
+
+ corenet_send_giftd_server_packets($1)
+ corenet_receive_giftd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive giftd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_giftd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_giftd_server_packets($1)
+ corenet_dontaudit_receive_giftd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_giftd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to giftd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_giftd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_giftd_server_packets'($*)) dnl
+
+ gen_require(`
+ type giftd_server_packet_t;
+ ')
+
+ allow $1 giftd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_giftd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the git port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the git port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the git port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_git_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_git_port'($*)) dnl
+
+ gen_require(`
+ type git_port_t;
+ ')
+
+ allow $1 git_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_git_port'($*)) dnl
+
+ gen_require(`
+ type git_port_t;
+ ')
+
+ allow $1 git_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_git_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the git port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_git_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_git_port'($*)) dnl
+
+ gen_require(`
+ type git_port_t;
+ ')
+
+ allow $1 git_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_git_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send git_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_git_client_packets'($*)) dnl
+
+ gen_require(`
+ type git_client_packet_t;
+ ')
+
+ allow $1 git_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send git_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_git_client_packets'($*)) dnl
+
+ gen_require(`
+ type git_client_packet_t;
+ ')
+
+ dontaudit $1 git_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive git_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_git_client_packets'($*)) dnl
+
+ gen_require(`
+ type git_client_packet_t;
+ ')
+
+ allow $1 git_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive git_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_git_client_packets'($*)) dnl
+
+ gen_require(`
+ type git_client_packet_t;
+ ')
+
+ dontaudit $1 git_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive git_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_git_client_packets'($*)) dnl
+
+ corenet_send_git_client_packets($1)
+ corenet_receive_git_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive git_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_git_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_git_client_packets($1)
+ corenet_dontaudit_receive_git_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_git_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to git_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_git_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_git_client_packets'($*)) dnl
+
+ gen_require(`
+ type git_client_packet_t;
+ ')
+
+ allow $1 git_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_git_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send git_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_git_server_packets'($*)) dnl
+
+ gen_require(`
+ type git_server_packet_t;
+ ')
+
+ allow $1 git_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send git_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_git_server_packets'($*)) dnl
+
+ gen_require(`
+ type git_server_packet_t;
+ ')
+
+ dontaudit $1 git_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive git_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_git_server_packets'($*)) dnl
+
+ gen_require(`
+ type git_server_packet_t;
+ ')
+
+ allow $1 git_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive git_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_git_server_packets'($*)) dnl
+
+ gen_require(`
+ type git_server_packet_t;
+ ')
+
+ dontaudit $1 git_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive git_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_git_server_packets'($*)) dnl
+
+ corenet_send_git_server_packets($1)
+ corenet_receive_git_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive git_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_git_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_git_server_packets($1)
+ corenet_dontaudit_receive_git_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_git_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to git_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_git_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_git_server_packets'($*)) dnl
+
+ gen_require(`
+ type git_server_packet_t;
+ ')
+
+ allow $1 git_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_git_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the glance_registry port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_glance_registry_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_glance_registry_port'($*)) dnl
+
+ gen_require(`
+ type glance_registry_port_t;
+ ')
+
+ allow $1 glance_registry_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_glance_registry_port'($*)) dnl
+
+ gen_require(`
+ type glance_registry_port_t;
+ ')
+
+ allow $1 glance_registry_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_glance_registry_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the glance_registry port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_glance_registry_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_glance_registry_port'($*)) dnl
+
+ gen_require(`
+ type glance_registry_port_t;
+ ')
+
+ allow $1 glance_registry_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_glance_registry_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send glance_registry_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_glance_registry_client_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_client_packet_t;
+ ')
+
+ allow $1 glance_registry_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send glance_registry_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_glance_registry_client_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_client_packet_t;
+ ')
+
+ dontaudit $1 glance_registry_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive glance_registry_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_glance_registry_client_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_client_packet_t;
+ ')
+
+ allow $1 glance_registry_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive glance_registry_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_glance_registry_client_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_client_packet_t;
+ ')
+
+ dontaudit $1 glance_registry_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive glance_registry_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_glance_registry_client_packets'($*)) dnl
+
+ corenet_send_glance_registry_client_packets($1)
+ corenet_receive_glance_registry_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive glance_registry_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_glance_registry_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_glance_registry_client_packets($1)
+ corenet_dontaudit_receive_glance_registry_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to glance_registry_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_glance_registry_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_glance_registry_client_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_client_packet_t;
+ ')
+
+ allow $1 glance_registry_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_glance_registry_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send glance_registry_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_glance_registry_server_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_server_packet_t;
+ ')
+
+ allow $1 glance_registry_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send glance_registry_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_glance_registry_server_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_server_packet_t;
+ ')
+
+ dontaudit $1 glance_registry_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive glance_registry_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_glance_registry_server_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_server_packet_t;
+ ')
+
+ allow $1 glance_registry_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive glance_registry_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_glance_registry_server_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_server_packet_t;
+ ')
+
+ dontaudit $1 glance_registry_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive glance_registry_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_glance_registry_server_packets'($*)) dnl
+
+ corenet_send_glance_registry_server_packets($1)
+ corenet_receive_glance_registry_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive glance_registry_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_glance_registry_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_glance_registry_server_packets($1)
+ corenet_dontaudit_receive_glance_registry_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to glance_registry_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_glance_registry_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_glance_registry_server_packets'($*)) dnl
+
+ gen_require(`
+ type glance_registry_server_packet_t;
+ ')
+
+ allow $1 glance_registry_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_glance_registry_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the gopher port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the gopher port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the gopher port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gopher_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gopher_port'($*)) dnl
+
+ gen_require(`
+ type gopher_port_t;
+ ')
+
+ allow $1 gopher_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gopher_port'($*)) dnl
+
+ gen_require(`
+ type gopher_port_t;
+ ')
+
+ allow $1 gopher_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gopher_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the gopher port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_gopher_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gopher_port'($*)) dnl
+
+ gen_require(`
+ type gopher_port_t;
+ ')
+
+ allow $1 gopher_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gopher_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gopher_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gopher_client_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_client_packet_t;
+ ')
+
+ allow $1 gopher_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gopher_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gopher_client_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_client_packet_t;
+ ')
+
+ dontaudit $1 gopher_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gopher_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gopher_client_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_client_packet_t;
+ ')
+
+ allow $1 gopher_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gopher_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gopher_client_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_client_packet_t;
+ ')
+
+ dontaudit $1 gopher_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gopher_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gopher_client_packets'($*)) dnl
+
+ corenet_send_gopher_client_packets($1)
+ corenet_receive_gopher_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gopher_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gopher_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_gopher_client_packets($1)
+ corenet_dontaudit_receive_gopher_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gopher_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gopher_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gopher_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gopher_client_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_client_packet_t;
+ ')
+
+ allow $1 gopher_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gopher_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gopher_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gopher_server_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_server_packet_t;
+ ')
+
+ allow $1 gopher_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gopher_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gopher_server_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_server_packet_t;
+ ')
+
+ dontaudit $1 gopher_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gopher_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gopher_server_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_server_packet_t;
+ ')
+
+ allow $1 gopher_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gopher_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gopher_server_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_server_packet_t;
+ ')
+
+ dontaudit $1 gopher_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gopher_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gopher_server_packets'($*)) dnl
+
+ corenet_send_gopher_server_packets($1)
+ corenet_receive_gopher_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gopher_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gopher_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_gopher_server_packets($1)
+ corenet_dontaudit_receive_gopher_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gopher_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gopher_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gopher_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gopher_server_packets'($*)) dnl
+
+ gen_require(`
+ type gopher_server_packet_t;
+ ')
+
+ allow $1 gopher_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gopher_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the gpsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the gpsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the gpsd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_gpsd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_gpsd_port'($*)) dnl
+
+ gen_require(`
+ type gpsd_port_t;
+ ')
+
+ allow $1 gpsd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_gpsd_port'($*)) dnl
+
+ gen_require(`
+ type gpsd_port_t;
+ ')
+
+ allow $1 gpsd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_gpsd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the gpsd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_gpsd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_gpsd_port'($*)) dnl
+
+ gen_require(`
+ type gpsd_port_t;
+ ')
+
+ allow $1 gpsd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_gpsd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gpsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gpsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_client_packet_t;
+ ')
+
+ allow $1 gpsd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gpsd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gpsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_client_packet_t;
+ ')
+
+ dontaudit $1 gpsd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gpsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gpsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_client_packet_t;
+ ')
+
+ allow $1 gpsd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gpsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gpsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_client_packet_t;
+ ')
+
+ dontaudit $1 gpsd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gpsd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gpsd_client_packets'($*)) dnl
+
+ corenet_send_gpsd_client_packets($1)
+ corenet_receive_gpsd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gpsd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gpsd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_gpsd_client_packets($1)
+ corenet_dontaudit_receive_gpsd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gpsd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gpsd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gpsd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gpsd_client_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_client_packet_t;
+ ')
+
+ allow $1 gpsd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gpsd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send gpsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_gpsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_server_packet_t;
+ ')
+
+ allow $1 gpsd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send gpsd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_gpsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_server_packet_t;
+ ')
+
+ dontaudit $1 gpsd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive gpsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_gpsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_server_packet_t;
+ ')
+
+ allow $1 gpsd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive gpsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_gpsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_server_packet_t;
+ ')
+
+ dontaudit $1 gpsd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive gpsd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_gpsd_server_packets'($*)) dnl
+
+ corenet_send_gpsd_server_packets($1)
+ corenet_receive_gpsd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive gpsd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_gpsd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_gpsd_server_packets($1)
+ corenet_dontaudit_receive_gpsd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_gpsd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to gpsd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_gpsd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_gpsd_server_packets'($*)) dnl
+
+ gen_require(`
+ type gpsd_server_packet_t;
+ ')
+
+ allow $1 gpsd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_gpsd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the hadoop_datanode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hadoop_datanode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hadoop_datanode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_port_t;
+ ')
+
+ allow $1 hadoop_datanode_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hadoop_datanode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_port_t;
+ ')
+
+ allow $1 hadoop_datanode_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the hadoop_datanode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_hadoop_datanode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hadoop_datanode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_port_t;
+ ')
+
+ allow $1 hadoop_datanode_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hadoop_datanode_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hadoop_datanode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_datanode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_client_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hadoop_datanode_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_datanode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_client_packet_t;
+ ')
+
+ dontaudit $1 hadoop_datanode_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hadoop_datanode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_datanode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_client_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hadoop_datanode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_datanode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_client_packet_t;
+ ')
+
+ dontaudit $1 hadoop_datanode_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hadoop_datanode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_datanode_client_packets'($*)) dnl
+
+ corenet_send_hadoop_datanode_client_packets($1)
+ corenet_receive_hadoop_datanode_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hadoop_datanode_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_datanode_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_hadoop_datanode_client_packets($1)
+ corenet_dontaudit_receive_hadoop_datanode_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hadoop_datanode_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hadoop_datanode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_datanode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_client_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_datanode_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hadoop_datanode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_datanode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_server_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hadoop_datanode_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_datanode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_server_packet_t;
+ ')
+
+ dontaudit $1 hadoop_datanode_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hadoop_datanode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_datanode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_server_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hadoop_datanode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_datanode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_server_packet_t;
+ ')
+
+ dontaudit $1 hadoop_datanode_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hadoop_datanode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_datanode_server_packets'($*)) dnl
+
+ corenet_send_hadoop_datanode_server_packets($1)
+ corenet_receive_hadoop_datanode_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hadoop_datanode_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_datanode_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_hadoop_datanode_server_packets($1)
+ corenet_dontaudit_receive_hadoop_datanode_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hadoop_datanode_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hadoop_datanode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_datanode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_datanode_server_packet_t;
+ ')
+
+ allow $1 hadoop_datanode_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_datanode_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the hadoop_namenode port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hadoop_namenode_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hadoop_namenode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_port_t;
+ ')
+
+ allow $1 hadoop_namenode_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hadoop_namenode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_port_t;
+ ')
+
+ allow $1 hadoop_namenode_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the hadoop_namenode port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_hadoop_namenode_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hadoop_namenode_port'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_port_t;
+ ')
+
+ allow $1 hadoop_namenode_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hadoop_namenode_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hadoop_namenode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_namenode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_client_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hadoop_namenode_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_namenode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_client_packet_t;
+ ')
+
+ dontaudit $1 hadoop_namenode_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hadoop_namenode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_namenode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_client_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hadoop_namenode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_namenode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_client_packet_t;
+ ')
+
+ dontaudit $1 hadoop_namenode_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hadoop_namenode_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_namenode_client_packets'($*)) dnl
+
+ corenet_send_hadoop_namenode_client_packets($1)
+ corenet_receive_hadoop_namenode_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hadoop_namenode_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_namenode_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_hadoop_namenode_client_packets($1)
+ corenet_dontaudit_receive_hadoop_namenode_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hadoop_namenode_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hadoop_namenode_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_namenode_client_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_client_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_namenode_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hadoop_namenode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hadoop_namenode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_server_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hadoop_namenode_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hadoop_namenode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_server_packet_t;
+ ')
+
+ dontaudit $1 hadoop_namenode_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hadoop_namenode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hadoop_namenode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_server_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hadoop_namenode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hadoop_namenode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_server_packet_t;
+ ')
+
+ dontaudit $1 hadoop_namenode_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hadoop_namenode_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hadoop_namenode_server_packets'($*)) dnl
+
+ corenet_send_hadoop_namenode_server_packets($1)
+ corenet_receive_hadoop_namenode_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hadoop_namenode_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hadoop_namenode_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_hadoop_namenode_server_packets($1)
+ corenet_dontaudit_receive_hadoop_namenode_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hadoop_namenode_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hadoop_namenode_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hadoop_namenode_server_packets'($*)) dnl
+
+ gen_require(`
+ type hadoop_namenode_server_packet_t;
+ ')
+
+ allow $1 hadoop_namenode_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hadoop_namenode_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the hddtemp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hddtemp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hddtemp_port'($*)) dnl
+
+ gen_require(`
+ type hddtemp_port_t;
+ ')
+
+ allow $1 hddtemp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hddtemp_port'($*)) dnl
+
+ gen_require(`
+ type hddtemp_port_t;
+ ')
+
+ allow $1 hddtemp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hddtemp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the hddtemp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_hddtemp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hddtemp_port'($*)) dnl
+
+ gen_require(`
+ type hddtemp_port_t;
+ ')
+
+ allow $1 hddtemp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hddtemp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hddtemp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hddtemp_client_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_client_packet_t;
+ ')
+
+ allow $1 hddtemp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hddtemp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hddtemp_client_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_client_packet_t;
+ ')
+
+ dontaudit $1 hddtemp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hddtemp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hddtemp_client_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_client_packet_t;
+ ')
+
+ allow $1 hddtemp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hddtemp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hddtemp_client_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_client_packet_t;
+ ')
+
+ dontaudit $1 hddtemp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hddtemp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hddtemp_client_packets'($*)) dnl
+
+ corenet_send_hddtemp_client_packets($1)
+ corenet_receive_hddtemp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hddtemp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hddtemp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_hddtemp_client_packets($1)
+ corenet_dontaudit_receive_hddtemp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hddtemp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hddtemp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hddtemp_client_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_client_packet_t;
+ ')
+
+ allow $1 hddtemp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hddtemp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hddtemp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hddtemp_server_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_server_packet_t;
+ ')
+
+ allow $1 hddtemp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hddtemp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hddtemp_server_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_server_packet_t;
+ ')
+
+ dontaudit $1 hddtemp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hddtemp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hddtemp_server_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_server_packet_t;
+ ')
+
+ allow $1 hddtemp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hddtemp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hddtemp_server_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_server_packet_t;
+ ')
+
+ dontaudit $1 hddtemp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hddtemp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hddtemp_server_packets'($*)) dnl
+
+ corenet_send_hddtemp_server_packets($1)
+ corenet_receive_hddtemp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hddtemp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hddtemp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_hddtemp_server_packets($1)
+ corenet_dontaudit_receive_hddtemp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hddtemp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hddtemp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hddtemp_server_packets'($*)) dnl
+
+ gen_require(`
+ type hddtemp_server_packet_t;
+ ')
+
+ allow $1 hddtemp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hddtemp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the howl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the howl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the howl port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_howl_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_howl_port'($*)) dnl
+
+ gen_require(`
+ type howl_port_t;
+ ')
+
+ allow $1 howl_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_howl_port'($*)) dnl
+
+ gen_require(`
+ type howl_port_t;
+ ')
+
+ allow $1 howl_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_howl_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the howl port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_howl_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_howl_port'($*)) dnl
+
+ gen_require(`
+ type howl_port_t;
+ ')
+
+ allow $1 howl_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_howl_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send howl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_howl_client_packets'($*)) dnl
+
+ gen_require(`
+ type howl_client_packet_t;
+ ')
+
+ allow $1 howl_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send howl_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_howl_client_packets'($*)) dnl
+
+ gen_require(`
+ type howl_client_packet_t;
+ ')
+
+ dontaudit $1 howl_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive howl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_howl_client_packets'($*)) dnl
+
+ gen_require(`
+ type howl_client_packet_t;
+ ')
+
+ allow $1 howl_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive howl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_howl_client_packets'($*)) dnl
+
+ gen_require(`
+ type howl_client_packet_t;
+ ')
+
+ dontaudit $1 howl_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive howl_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_howl_client_packets'($*)) dnl
+
+ corenet_send_howl_client_packets($1)
+ corenet_receive_howl_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive howl_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_howl_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_howl_client_packets($1)
+ corenet_dontaudit_receive_howl_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_howl_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to howl_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_howl_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_howl_client_packets'($*)) dnl
+
+ gen_require(`
+ type howl_client_packet_t;
+ ')
+
+ allow $1 howl_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_howl_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send howl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_howl_server_packets'($*)) dnl
+
+ gen_require(`
+ type howl_server_packet_t;
+ ')
+
+ allow $1 howl_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send howl_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_howl_server_packets'($*)) dnl
+
+ gen_require(`
+ type howl_server_packet_t;
+ ')
+
+ dontaudit $1 howl_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive howl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_howl_server_packets'($*)) dnl
+
+ gen_require(`
+ type howl_server_packet_t;
+ ')
+
+ allow $1 howl_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive howl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_howl_server_packets'($*)) dnl
+
+ gen_require(`
+ type howl_server_packet_t;
+ ')
+
+ dontaudit $1 howl_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive howl_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_howl_server_packets'($*)) dnl
+
+ corenet_send_howl_server_packets($1)
+ corenet_receive_howl_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive howl_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_howl_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_howl_server_packets($1)
+ corenet_dontaudit_receive_howl_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_howl_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to howl_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_howl_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_howl_server_packets'($*)) dnl
+
+ gen_require(`
+ type howl_server_packet_t;
+ ')
+
+ allow $1 howl_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_howl_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the hplip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the hplip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the hplip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_hplip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_hplip_port'($*)) dnl
+
+ gen_require(`
+ type hplip_port_t;
+ ')
+
+ allow $1 hplip_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_hplip_port'($*)) dnl
+
+ gen_require(`
+ type hplip_port_t;
+ ')
+
+ allow $1 hplip_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_hplip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the hplip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_hplip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_hplip_port'($*)) dnl
+
+ gen_require(`
+ type hplip_port_t;
+ ')
+
+ allow $1 hplip_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_hplip_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hplip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hplip_client_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_client_packet_t;
+ ')
+
+ allow $1 hplip_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hplip_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hplip_client_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_client_packet_t;
+ ')
+
+ dontaudit $1 hplip_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hplip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hplip_client_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_client_packet_t;
+ ')
+
+ allow $1 hplip_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hplip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hplip_client_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_client_packet_t;
+ ')
+
+ dontaudit $1 hplip_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hplip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hplip_client_packets'($*)) dnl
+
+ corenet_send_hplip_client_packets($1)
+ corenet_receive_hplip_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hplip_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hplip_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_hplip_client_packets($1)
+ corenet_dontaudit_receive_hplip_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hplip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hplip_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hplip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hplip_client_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_client_packet_t;
+ ')
+
+ allow $1 hplip_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hplip_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send hplip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_hplip_server_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_server_packet_t;
+ ')
+
+ allow $1 hplip_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send hplip_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_hplip_server_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_server_packet_t;
+ ')
+
+ dontaudit $1 hplip_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive hplip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_hplip_server_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_server_packet_t;
+ ')
+
+ allow $1 hplip_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive hplip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_hplip_server_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_server_packet_t;
+ ')
+
+ dontaudit $1 hplip_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive hplip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_hplip_server_packets'($*)) dnl
+
+ corenet_send_hplip_server_packets($1)
+ corenet_receive_hplip_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive hplip_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_hplip_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_hplip_server_packets($1)
+ corenet_dontaudit_receive_hplip_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_hplip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to hplip_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_hplip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_hplip_server_packets'($*)) dnl
+
+ gen_require(`
+ type hplip_server_packet_t;
+ ')
+
+ allow $1 hplip_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_hplip_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_http_port'($*)) dnl
+
+ gen_require(`
+ type http_port_t;
+ ')
+
+ allow $1 http_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_http_port'($*)) dnl
+
+ gen_require(`
+ type http_port_t;
+ ')
+
+ allow $1 http_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_http_port'($*)) dnl
+
+ gen_require(`
+ type http_port_t;
+ ')
+
+ allow $1 http_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_http_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_client_packet_t;
+ ')
+
+ allow $1 http_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send http_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_client_packet_t;
+ ')
+
+ dontaudit $1 http_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_client_packet_t;
+ ')
+
+ allow $1 http_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_client_packet_t;
+ ')
+
+ dontaudit $1 http_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_client_packets'($*)) dnl
+
+ corenet_send_http_client_packets($1)
+ corenet_receive_http_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive http_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_http_client_packets($1)
+ corenet_dontaudit_receive_http_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to http_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_client_packet_t;
+ ')
+
+ allow $1 http_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_server_packet_t;
+ ')
+
+ allow $1 http_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send http_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_server_packet_t;
+ ')
+
+ dontaudit $1 http_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_server_packet_t;
+ ')
+
+ allow $1 http_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_server_packet_t;
+ ')
+
+ dontaudit $1 http_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_server_packets'($*)) dnl
+
+ corenet_send_http_server_packets($1)
+ corenet_receive_http_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive http_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_http_server_packets($1)
+ corenet_dontaudit_receive_http_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to http_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_server_packet_t;
+ ')
+
+ allow $1 http_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_server_packets'($*)) dnl
+ ')
+
+
+ #8443 is mod_nss default port
+
+
+########################################
+##
+## Send and receive TCP traffic on the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the http_cache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the http_cache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the http_cache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_http_cache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_http_cache_port'($*)) dnl
+
+ gen_require(`
+ type http_cache_port_t;
+ ')
+
+ allow $1 http_cache_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_http_cache_port'($*)) dnl
+
+ gen_require(`
+ type http_cache_port_t;
+ ')
+
+ allow $1 http_cache_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_http_cache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the http_cache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_http_cache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_http_cache_port'($*)) dnl
+
+ gen_require(`
+ type http_cache_port_t;
+ ')
+
+ allow $1 http_cache_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_http_cache_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send http_cache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_http_cache_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_client_packet_t;
+ ')
+
+ allow $1 http_cache_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send http_cache_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_cache_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_client_packet_t;
+ ')
+
+ dontaudit $1 http_cache_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive http_cache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_http_cache_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_client_packet_t;
+ ')
+
+ allow $1 http_cache_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive http_cache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_cache_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_client_packet_t;
+ ')
+
+ dontaudit $1 http_cache_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive http_cache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_cache_client_packets'($*)) dnl
+
+ corenet_send_http_cache_client_packets($1)
+ corenet_receive_http_cache_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive http_cache_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_cache_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_http_cache_client_packets($1)
+ corenet_dontaudit_receive_http_cache_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_cache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to http_cache_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_http_cache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_cache_client_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_client_packet_t;
+ ')
+
+ allow $1 http_cache_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_cache_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send http_cache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_http_cache_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_server_packet_t;
+ ')
+
+ allow $1 http_cache_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send http_cache_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_http_cache_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_server_packet_t;
+ ')
+
+ dontaudit $1 http_cache_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive http_cache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_http_cache_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_server_packet_t;
+ ')
+
+ allow $1 http_cache_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive http_cache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_http_cache_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_server_packet_t;
+ ')
+
+ dontaudit $1 http_cache_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive http_cache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_http_cache_server_packets'($*)) dnl
+
+ corenet_send_http_cache_server_packets($1)
+ corenet_receive_http_cache_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive http_cache_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_http_cache_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_http_cache_server_packets($1)
+ corenet_dontaudit_receive_http_cache_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_http_cache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to http_cache_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_http_cache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_http_cache_server_packets'($*)) dnl
+
+ gen_require(`
+ type http_cache_server_packet_t;
+ ')
+
+ allow $1 http_cache_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_http_cache_server_packets'($*)) dnl
+ ')
+
+
+ # 8118 is for privoxy
+
+
+########################################
+##
+## Send and receive TCP traffic on the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the i18n_input port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_i18n_input_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_i18n_input_port'($*)) dnl
+
+ gen_require(`
+ type i18n_input_port_t;
+ ')
+
+ allow $1 i18n_input_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_i18n_input_port'($*)) dnl
+
+ gen_require(`
+ type i18n_input_port_t;
+ ')
+
+ allow $1 i18n_input_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_i18n_input_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the i18n_input port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_i18n_input_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_i18n_input_port'($*)) dnl
+
+ gen_require(`
+ type i18n_input_port_t;
+ ')
+
+ allow $1 i18n_input_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_i18n_input_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send i18n_input_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_i18n_input_client_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_client_packet_t;
+ ')
+
+ allow $1 i18n_input_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send i18n_input_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_i18n_input_client_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_client_packet_t;
+ ')
+
+ dontaudit $1 i18n_input_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive i18n_input_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_i18n_input_client_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_client_packet_t;
+ ')
+
+ allow $1 i18n_input_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive i18n_input_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_i18n_input_client_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_client_packet_t;
+ ')
+
+ dontaudit $1 i18n_input_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive i18n_input_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_i18n_input_client_packets'($*)) dnl
+
+ corenet_send_i18n_input_client_packets($1)
+ corenet_receive_i18n_input_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive i18n_input_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_i18n_input_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_i18n_input_client_packets($1)
+ corenet_dontaudit_receive_i18n_input_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to i18n_input_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_i18n_input_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_i18n_input_client_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_client_packet_t;
+ ')
+
+ allow $1 i18n_input_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_i18n_input_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send i18n_input_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_i18n_input_server_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_server_packet_t;
+ ')
+
+ allow $1 i18n_input_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send i18n_input_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_i18n_input_server_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_server_packet_t;
+ ')
+
+ dontaudit $1 i18n_input_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive i18n_input_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_i18n_input_server_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_server_packet_t;
+ ')
+
+ allow $1 i18n_input_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive i18n_input_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_i18n_input_server_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_server_packet_t;
+ ')
+
+ dontaudit $1 i18n_input_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive i18n_input_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_i18n_input_server_packets'($*)) dnl
+
+ corenet_send_i18n_input_server_packets($1)
+ corenet_receive_i18n_input_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive i18n_input_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_i18n_input_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_i18n_input_server_packets($1)
+ corenet_dontaudit_receive_i18n_input_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to i18n_input_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_i18n_input_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_i18n_input_server_packets'($*)) dnl
+
+ gen_require(`
+ type i18n_input_server_packet_t;
+ ')
+
+ allow $1 i18n_input_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_i18n_input_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the imaze port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the imaze port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the imaze port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_imaze_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_imaze_port'($*)) dnl
+
+ gen_require(`
+ type imaze_port_t;
+ ')
+
+ allow $1 imaze_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_imaze_port'($*)) dnl
+
+ gen_require(`
+ type imaze_port_t;
+ ')
+
+ allow $1 imaze_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_imaze_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the imaze port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_imaze_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_imaze_port'($*)) dnl
+
+ gen_require(`
+ type imaze_port_t;
+ ')
+
+ allow $1 imaze_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_imaze_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send imaze_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_imaze_client_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_client_packet_t;
+ ')
+
+ allow $1 imaze_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send imaze_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_imaze_client_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_client_packet_t;
+ ')
+
+ dontaudit $1 imaze_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive imaze_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_imaze_client_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_client_packet_t;
+ ')
+
+ allow $1 imaze_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive imaze_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_imaze_client_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_client_packet_t;
+ ')
+
+ dontaudit $1 imaze_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive imaze_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_imaze_client_packets'($*)) dnl
+
+ corenet_send_imaze_client_packets($1)
+ corenet_receive_imaze_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive imaze_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_imaze_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_imaze_client_packets($1)
+ corenet_dontaudit_receive_imaze_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_imaze_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to imaze_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_imaze_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_imaze_client_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_client_packet_t;
+ ')
+
+ allow $1 imaze_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_imaze_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send imaze_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_imaze_server_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_server_packet_t;
+ ')
+
+ allow $1 imaze_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send imaze_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_imaze_server_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_server_packet_t;
+ ')
+
+ dontaudit $1 imaze_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive imaze_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_imaze_server_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_server_packet_t;
+ ')
+
+ allow $1 imaze_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive imaze_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_imaze_server_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_server_packet_t;
+ ')
+
+ dontaudit $1 imaze_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive imaze_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_imaze_server_packets'($*)) dnl
+
+ corenet_send_imaze_server_packets($1)
+ corenet_receive_imaze_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive imaze_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_imaze_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_imaze_server_packets($1)
+ corenet_dontaudit_receive_imaze_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_imaze_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to imaze_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_imaze_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_imaze_server_packets'($*)) dnl
+
+ gen_require(`
+ type imaze_server_packet_t;
+ ')
+
+ allow $1 imaze_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_imaze_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the inetd_child port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_inetd_child_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_inetd_child_port'($*)) dnl
+
+ gen_require(`
+ type inetd_child_port_t;
+ ')
+
+ allow $1 inetd_child_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_inetd_child_port'($*)) dnl
+
+ gen_require(`
+ type inetd_child_port_t;
+ ')
+
+ allow $1 inetd_child_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_inetd_child_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the inetd_child port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_inetd_child_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_inetd_child_port'($*)) dnl
+
+ gen_require(`
+ type inetd_child_port_t;
+ ')
+
+ allow $1 inetd_child_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_inetd_child_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send inetd_child_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_inetd_child_client_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_client_packet_t;
+ ')
+
+ allow $1 inetd_child_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send inetd_child_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_inetd_child_client_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_client_packet_t;
+ ')
+
+ dontaudit $1 inetd_child_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive inetd_child_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_inetd_child_client_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_client_packet_t;
+ ')
+
+ allow $1 inetd_child_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive inetd_child_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_inetd_child_client_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_client_packet_t;
+ ')
+
+ dontaudit $1 inetd_child_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive inetd_child_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_inetd_child_client_packets'($*)) dnl
+
+ corenet_send_inetd_child_client_packets($1)
+ corenet_receive_inetd_child_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive inetd_child_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_inetd_child_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_inetd_child_client_packets($1)
+ corenet_dontaudit_receive_inetd_child_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to inetd_child_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_inetd_child_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_inetd_child_client_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_client_packet_t;
+ ')
+
+ allow $1 inetd_child_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_inetd_child_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send inetd_child_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_inetd_child_server_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_server_packet_t;
+ ')
+
+ allow $1 inetd_child_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send inetd_child_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_inetd_child_server_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_server_packet_t;
+ ')
+
+ dontaudit $1 inetd_child_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive inetd_child_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_inetd_child_server_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_server_packet_t;
+ ')
+
+ allow $1 inetd_child_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive inetd_child_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_inetd_child_server_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_server_packet_t;
+ ')
+
+ dontaudit $1 inetd_child_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive inetd_child_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_inetd_child_server_packets'($*)) dnl
+
+ corenet_send_inetd_child_server_packets($1)
+ corenet_receive_inetd_child_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive inetd_child_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_inetd_child_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_inetd_child_server_packets($1)
+ corenet_dontaudit_receive_inetd_child_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to inetd_child_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_inetd_child_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_inetd_child_server_packets'($*)) dnl
+
+ gen_require(`
+ type inetd_child_server_packet_t;
+ ')
+
+ allow $1 inetd_child_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_inetd_child_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the innd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the innd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the innd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_innd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_innd_port'($*)) dnl
+
+ gen_require(`
+ type innd_port_t;
+ ')
+
+ allow $1 innd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_innd_port'($*)) dnl
+
+ gen_require(`
+ type innd_port_t;
+ ')
+
+ allow $1 innd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_innd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the innd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_innd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_innd_port'($*)) dnl
+
+ gen_require(`
+ type innd_port_t;
+ ')
+
+ allow $1 innd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_innd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send innd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_innd_client_packets'($*)) dnl
+
+ gen_require(`
+ type innd_client_packet_t;
+ ')
+
+ allow $1 innd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send innd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_innd_client_packets'($*)) dnl
+
+ gen_require(`
+ type innd_client_packet_t;
+ ')
+
+ dontaudit $1 innd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive innd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_innd_client_packets'($*)) dnl
+
+ gen_require(`
+ type innd_client_packet_t;
+ ')
+
+ allow $1 innd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive innd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_innd_client_packets'($*)) dnl
+
+ gen_require(`
+ type innd_client_packet_t;
+ ')
+
+ dontaudit $1 innd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive innd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_innd_client_packets'($*)) dnl
+
+ corenet_send_innd_client_packets($1)
+ corenet_receive_innd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive innd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_innd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_innd_client_packets($1)
+ corenet_dontaudit_receive_innd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_innd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to innd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_innd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_innd_client_packets'($*)) dnl
+
+ gen_require(`
+ type innd_client_packet_t;
+ ')
+
+ allow $1 innd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_innd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send innd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_innd_server_packets'($*)) dnl
+
+ gen_require(`
+ type innd_server_packet_t;
+ ')
+
+ allow $1 innd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send innd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_innd_server_packets'($*)) dnl
+
+ gen_require(`
+ type innd_server_packet_t;
+ ')
+
+ dontaudit $1 innd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive innd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_innd_server_packets'($*)) dnl
+
+ gen_require(`
+ type innd_server_packet_t;
+ ')
+
+ allow $1 innd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive innd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_innd_server_packets'($*)) dnl
+
+ gen_require(`
+ type innd_server_packet_t;
+ ')
+
+ dontaudit $1 innd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive innd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_innd_server_packets'($*)) dnl
+
+ corenet_send_innd_server_packets($1)
+ corenet_receive_innd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive innd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_innd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_innd_server_packets($1)
+ corenet_dontaudit_receive_innd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_innd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to innd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_innd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_innd_server_packets'($*)) dnl
+
+ gen_require(`
+ type innd_server_packet_t;
+ ')
+
+ allow $1 innd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_innd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the interwise port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the interwise port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the interwise port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_interwise_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_interwise_port'($*)) dnl
+
+ gen_require(`
+ type interwise_port_t;
+ ')
+
+ allow $1 interwise_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_interwise_port'($*)) dnl
+
+ gen_require(`
+ type interwise_port_t;
+ ')
+
+ allow $1 interwise_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_interwise_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the interwise port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_interwise_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_interwise_port'($*)) dnl
+
+ gen_require(`
+ type interwise_port_t;
+ ')
+
+ allow $1 interwise_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_interwise_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send interwise_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_interwise_client_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_client_packet_t;
+ ')
+
+ allow $1 interwise_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send interwise_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_interwise_client_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_client_packet_t;
+ ')
+
+ dontaudit $1 interwise_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive interwise_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_interwise_client_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_client_packet_t;
+ ')
+
+ allow $1 interwise_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive interwise_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_interwise_client_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_client_packet_t;
+ ')
+
+ dontaudit $1 interwise_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive interwise_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_interwise_client_packets'($*)) dnl
+
+ corenet_send_interwise_client_packets($1)
+ corenet_receive_interwise_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive interwise_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_interwise_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_interwise_client_packets($1)
+ corenet_dontaudit_receive_interwise_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_interwise_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to interwise_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_interwise_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_interwise_client_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_client_packet_t;
+ ')
+
+ allow $1 interwise_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_interwise_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send interwise_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_interwise_server_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_server_packet_t;
+ ')
+
+ allow $1 interwise_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send interwise_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_interwise_server_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_server_packet_t;
+ ')
+
+ dontaudit $1 interwise_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive interwise_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_interwise_server_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_server_packet_t;
+ ')
+
+ allow $1 interwise_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive interwise_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_interwise_server_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_server_packet_t;
+ ')
+
+ dontaudit $1 interwise_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive interwise_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_interwise_server_packets'($*)) dnl
+
+ corenet_send_interwise_server_packets($1)
+ corenet_receive_interwise_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive interwise_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_interwise_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_interwise_server_packets($1)
+ corenet_dontaudit_receive_interwise_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_interwise_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to interwise_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_interwise_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_interwise_server_packets'($*)) dnl
+
+ gen_require(`
+ type interwise_server_packet_t;
+ ')
+
+ allow $1 interwise_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_interwise_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ionixnetmon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ionixnetmon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ionixnetmon_port'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_port_t;
+ ')
+
+ allow $1 ionixnetmon_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ionixnetmon_port'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_port_t;
+ ')
+
+ allow $1 ionixnetmon_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ionixnetmon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ionixnetmon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ionixnetmon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ionixnetmon_port'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_port_t;
+ ')
+
+ allow $1 ionixnetmon_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ionixnetmon_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ionixnetmon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ionixnetmon_client_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_client_packet_t;
+ ')
+
+ allow $1 ionixnetmon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ionixnetmon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ionixnetmon_client_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_client_packet_t;
+ ')
+
+ dontaudit $1 ionixnetmon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ionixnetmon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ionixnetmon_client_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_client_packet_t;
+ ')
+
+ allow $1 ionixnetmon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ionixnetmon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ionixnetmon_client_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_client_packet_t;
+ ')
+
+ dontaudit $1 ionixnetmon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ionixnetmon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ionixnetmon_client_packets'($*)) dnl
+
+ corenet_send_ionixnetmon_client_packets($1)
+ corenet_receive_ionixnetmon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ionixnetmon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ionixnetmon_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ionixnetmon_client_packets($1)
+ corenet_dontaudit_receive_ionixnetmon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ionixnetmon_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ionixnetmon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ionixnetmon_client_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_client_packet_t;
+ ')
+
+ allow $1 ionixnetmon_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ionixnetmon_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ionixnetmon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ionixnetmon_server_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_server_packet_t;
+ ')
+
+ allow $1 ionixnetmon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ionixnetmon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ionixnetmon_server_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_server_packet_t;
+ ')
+
+ dontaudit $1 ionixnetmon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ionixnetmon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ionixnetmon_server_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_server_packet_t;
+ ')
+
+ allow $1 ionixnetmon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ionixnetmon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ionixnetmon_server_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_server_packet_t;
+ ')
+
+ dontaudit $1 ionixnetmon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ionixnetmon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ionixnetmon_server_packets'($*)) dnl
+
+ corenet_send_ionixnetmon_server_packets($1)
+ corenet_receive_ionixnetmon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ionixnetmon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ionixnetmon_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ionixnetmon_server_packets($1)
+ corenet_dontaudit_receive_ionixnetmon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ionixnetmon_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ionixnetmon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ionixnetmon_server_packets'($*)) dnl
+
+ gen_require(`
+ type ionixnetmon_server_packet_t;
+ ')
+
+ allow $1 ionixnetmon_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ionixnetmon_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ipmi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ipmi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ipmi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipmi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipmi_port'($*)) dnl
+
+ gen_require(`
+ type ipmi_port_t;
+ ')
+
+ allow $1 ipmi_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipmi_port'($*)) dnl
+
+ gen_require(`
+ type ipmi_port_t;
+ ')
+
+ allow $1 ipmi_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipmi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ipmi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ipmi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipmi_port'($*)) dnl
+
+ gen_require(`
+ type ipmi_port_t;
+ ')
+
+ allow $1 ipmi_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipmi_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipmi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipmi_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_client_packet_t;
+ ')
+
+ allow $1 ipmi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipmi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipmi_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_client_packet_t;
+ ')
+
+ dontaudit $1 ipmi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipmi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipmi_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_client_packet_t;
+ ')
+
+ allow $1 ipmi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipmi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipmi_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_client_packet_t;
+ ')
+
+ dontaudit $1 ipmi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipmi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipmi_client_packets'($*)) dnl
+
+ corenet_send_ipmi_client_packets($1)
+ corenet_receive_ipmi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipmi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipmi_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipmi_client_packets($1)
+ corenet_dontaudit_receive_ipmi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipmi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipmi_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipmi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipmi_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_client_packet_t;
+ ')
+
+ allow $1 ipmi_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipmi_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipmi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipmi_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_server_packet_t;
+ ')
+
+ allow $1 ipmi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipmi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipmi_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_server_packet_t;
+ ')
+
+ dontaudit $1 ipmi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipmi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipmi_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_server_packet_t;
+ ')
+
+ allow $1 ipmi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipmi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipmi_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_server_packet_t;
+ ')
+
+ dontaudit $1 ipmi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipmi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipmi_server_packets'($*)) dnl
+
+ corenet_send_ipmi_server_packets($1)
+ corenet_receive_ipmi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipmi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipmi_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipmi_server_packets($1)
+ corenet_dontaudit_receive_ipmi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipmi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipmi_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipmi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipmi_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipmi_server_packet_t;
+ ')
+
+ allow $1 ipmi_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipmi_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ipp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ipp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ipp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipp_port'($*)) dnl
+
+ gen_require(`
+ type ipp_port_t;
+ ')
+
+ allow $1 ipp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipp_port'($*)) dnl
+
+ gen_require(`
+ type ipp_port_t;
+ ')
+
+ allow $1 ipp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ipp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ipp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipp_port'($*)) dnl
+
+ gen_require(`
+ type ipp_port_t;
+ ')
+
+ allow $1 ipp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_client_packet_t;
+ ')
+
+ allow $1 ipp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_client_packet_t;
+ ')
+
+ dontaudit $1 ipp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_client_packet_t;
+ ')
+
+ allow $1 ipp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_client_packet_t;
+ ')
+
+ dontaudit $1 ipp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipp_client_packets'($*)) dnl
+
+ corenet_send_ipp_client_packets($1)
+ corenet_receive_ipp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipp_client_packets($1)
+ corenet_dontaudit_receive_ipp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_client_packet_t;
+ ')
+
+ allow $1 ipp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_server_packet_t;
+ ')
+
+ allow $1 ipp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_server_packet_t;
+ ')
+
+ dontaudit $1 ipp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_server_packet_t;
+ ')
+
+ allow $1 ipp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_server_packet_t;
+ ')
+
+ dontaudit $1 ipp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipp_server_packets'($*)) dnl
+
+ corenet_send_ipp_server_packets($1)
+ corenet_receive_ipp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipp_server_packets($1)
+ corenet_dontaudit_receive_ipp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipp_server_packet_t;
+ ')
+
+ allow $1 ipp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ipsecnat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ipsecnat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ipsecnat_port'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_port_t;
+ ')
+
+ allow $1 ipsecnat_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ipsecnat_port'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_port_t;
+ ')
+
+ allow $1 ipsecnat_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ipsecnat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ipsecnat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ipsecnat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ipsecnat_port'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_port_t;
+ ')
+
+ allow $1 ipsecnat_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ipsecnat_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipsecnat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipsecnat_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_client_packet_t;
+ ')
+
+ allow $1 ipsecnat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipsecnat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipsecnat_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_client_packet_t;
+ ')
+
+ dontaudit $1 ipsecnat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipsecnat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipsecnat_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_client_packet_t;
+ ')
+
+ allow $1 ipsecnat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipsecnat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipsecnat_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_client_packet_t;
+ ')
+
+ dontaudit $1 ipsecnat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipsecnat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipsecnat_client_packets'($*)) dnl
+
+ corenet_send_ipsecnat_client_packets($1)
+ corenet_receive_ipsecnat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipsecnat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipsecnat_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipsecnat_client_packets($1)
+ corenet_dontaudit_receive_ipsecnat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipsecnat_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipsecnat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipsecnat_client_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_client_packet_t;
+ ')
+
+ allow $1 ipsecnat_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipsecnat_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ipsecnat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ipsecnat_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_server_packet_t;
+ ')
+
+ allow $1 ipsecnat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ipsecnat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ipsecnat_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_server_packet_t;
+ ')
+
+ dontaudit $1 ipsecnat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ipsecnat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ipsecnat_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_server_packet_t;
+ ')
+
+ allow $1 ipsecnat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ipsecnat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ipsecnat_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_server_packet_t;
+ ')
+
+ dontaudit $1 ipsecnat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ipsecnat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ipsecnat_server_packets'($*)) dnl
+
+ corenet_send_ipsecnat_server_packets($1)
+ corenet_receive_ipsecnat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ipsecnat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ipsecnat_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ipsecnat_server_packets($1)
+ corenet_dontaudit_receive_ipsecnat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ipsecnat_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ipsecnat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ipsecnat_server_packets'($*)) dnl
+
+ gen_require(`
+ type ipsecnat_server_packet_t;
+ ')
+
+ allow $1 ipsecnat_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ipsecnat_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ircd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ircd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ircd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ircd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ircd_port'($*)) dnl
+
+ gen_require(`
+ type ircd_port_t;
+ ')
+
+ allow $1 ircd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ircd_port'($*)) dnl
+
+ gen_require(`
+ type ircd_port_t;
+ ')
+
+ allow $1 ircd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ircd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ircd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ircd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ircd_port'($*)) dnl
+
+ gen_require(`
+ type ircd_port_t;
+ ')
+
+ allow $1 ircd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ircd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ircd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ircd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_client_packet_t;
+ ')
+
+ allow $1 ircd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ircd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ircd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_client_packet_t;
+ ')
+
+ dontaudit $1 ircd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ircd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ircd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_client_packet_t;
+ ')
+
+ allow $1 ircd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ircd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ircd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_client_packet_t;
+ ')
+
+ dontaudit $1 ircd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ircd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ircd_client_packets'($*)) dnl
+
+ corenet_send_ircd_client_packets($1)
+ corenet_receive_ircd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ircd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ircd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ircd_client_packets($1)
+ corenet_dontaudit_receive_ircd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ircd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ircd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ircd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ircd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_client_packet_t;
+ ')
+
+ allow $1 ircd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ircd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ircd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ircd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_server_packet_t;
+ ')
+
+ allow $1 ircd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ircd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ircd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_server_packet_t;
+ ')
+
+ dontaudit $1 ircd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ircd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ircd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_server_packet_t;
+ ')
+
+ allow $1 ircd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ircd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ircd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_server_packet_t;
+ ')
+
+ dontaudit $1 ircd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ircd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ircd_server_packets'($*)) dnl
+
+ corenet_send_ircd_server_packets($1)
+ corenet_receive_ircd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ircd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ircd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ircd_server_packets($1)
+ corenet_dontaudit_receive_ircd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ircd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ircd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ircd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ircd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ircd_server_packet_t;
+ ')
+
+ allow $1 ircd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ircd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the isakmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the isakmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the isakmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_isakmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_isakmp_port'($*)) dnl
+
+ gen_require(`
+ type isakmp_port_t;
+ ')
+
+ allow $1 isakmp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_isakmp_port'($*)) dnl
+
+ gen_require(`
+ type isakmp_port_t;
+ ')
+
+ allow $1 isakmp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_isakmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the isakmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_isakmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_isakmp_port'($*)) dnl
+
+ gen_require(`
+ type isakmp_port_t;
+ ')
+
+ allow $1 isakmp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_isakmp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send isakmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_isakmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_client_packet_t;
+ ')
+
+ allow $1 isakmp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send isakmp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isakmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_client_packet_t;
+ ')
+
+ dontaudit $1 isakmp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive isakmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_isakmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_client_packet_t;
+ ')
+
+ allow $1 isakmp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive isakmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isakmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_client_packet_t;
+ ')
+
+ dontaudit $1 isakmp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive isakmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isakmp_client_packets'($*)) dnl
+
+ corenet_send_isakmp_client_packets($1)
+ corenet_receive_isakmp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive isakmp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isakmp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_isakmp_client_packets($1)
+ corenet_dontaudit_receive_isakmp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isakmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to isakmp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_isakmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isakmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_client_packet_t;
+ ')
+
+ allow $1 isakmp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_isakmp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send isakmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_isakmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_server_packet_t;
+ ')
+
+ allow $1 isakmp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send isakmp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isakmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_server_packet_t;
+ ')
+
+ dontaudit $1 isakmp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive isakmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_isakmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_server_packet_t;
+ ')
+
+ allow $1 isakmp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive isakmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isakmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_server_packet_t;
+ ')
+
+ dontaudit $1 isakmp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive isakmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isakmp_server_packets'($*)) dnl
+
+ corenet_send_isakmp_server_packets($1)
+ corenet_receive_isakmp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive isakmp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isakmp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_isakmp_server_packets($1)
+ corenet_dontaudit_receive_isakmp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isakmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to isakmp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_isakmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isakmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type isakmp_server_packet_t;
+ ')
+
+ allow $1 isakmp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_isakmp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the iscsi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the iscsi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the iscsi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_iscsi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_iscsi_port'($*)) dnl
+
+ gen_require(`
+ type iscsi_port_t;
+ ')
+
+ allow $1 iscsi_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_iscsi_port'($*)) dnl
+
+ gen_require(`
+ type iscsi_port_t;
+ ')
+
+ allow $1 iscsi_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_iscsi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the iscsi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_iscsi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_iscsi_port'($*)) dnl
+
+ gen_require(`
+ type iscsi_port_t;
+ ')
+
+ allow $1 iscsi_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_iscsi_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send iscsi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_iscsi_client_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_client_packet_t;
+ ')
+
+ allow $1 iscsi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send iscsi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_iscsi_client_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_client_packet_t;
+ ')
+
+ dontaudit $1 iscsi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive iscsi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_iscsi_client_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_client_packet_t;
+ ')
+
+ allow $1 iscsi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive iscsi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_iscsi_client_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_client_packet_t;
+ ')
+
+ dontaudit $1 iscsi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive iscsi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_iscsi_client_packets'($*)) dnl
+
+ corenet_send_iscsi_client_packets($1)
+ corenet_receive_iscsi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive iscsi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_iscsi_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_iscsi_client_packets($1)
+ corenet_dontaudit_receive_iscsi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_iscsi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to iscsi_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_iscsi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_iscsi_client_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_client_packet_t;
+ ')
+
+ allow $1 iscsi_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_iscsi_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send iscsi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_iscsi_server_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_server_packet_t;
+ ')
+
+ allow $1 iscsi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send iscsi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_iscsi_server_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_server_packet_t;
+ ')
+
+ dontaudit $1 iscsi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive iscsi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_iscsi_server_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_server_packet_t;
+ ')
+
+ allow $1 iscsi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive iscsi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_iscsi_server_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_server_packet_t;
+ ')
+
+ dontaudit $1 iscsi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive iscsi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_iscsi_server_packets'($*)) dnl
+
+ corenet_send_iscsi_server_packets($1)
+ corenet_receive_iscsi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive iscsi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_iscsi_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_iscsi_server_packets($1)
+ corenet_dontaudit_receive_iscsi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_iscsi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to iscsi_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_iscsi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_iscsi_server_packets'($*)) dnl
+
+ gen_require(`
+ type iscsi_server_packet_t;
+ ')
+
+ allow $1 iscsi_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_iscsi_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the isns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the isns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the isns port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_isns_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_isns_port'($*)) dnl
+
+ gen_require(`
+ type isns_port_t;
+ ')
+
+ allow $1 isns_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_isns_port'($*)) dnl
+
+ gen_require(`
+ type isns_port_t;
+ ')
+
+ allow $1 isns_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_isns_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the isns port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_isns_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_isns_port'($*)) dnl
+
+ gen_require(`
+ type isns_port_t;
+ ')
+
+ allow $1 isns_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_isns_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send isns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_isns_client_packets'($*)) dnl
+
+ gen_require(`
+ type isns_client_packet_t;
+ ')
+
+ allow $1 isns_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send isns_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isns_client_packets'($*)) dnl
+
+ gen_require(`
+ type isns_client_packet_t;
+ ')
+
+ dontaudit $1 isns_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive isns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_isns_client_packets'($*)) dnl
+
+ gen_require(`
+ type isns_client_packet_t;
+ ')
+
+ allow $1 isns_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive isns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isns_client_packets'($*)) dnl
+
+ gen_require(`
+ type isns_client_packet_t;
+ ')
+
+ dontaudit $1 isns_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive isns_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isns_client_packets'($*)) dnl
+
+ corenet_send_isns_client_packets($1)
+ corenet_receive_isns_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive isns_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isns_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_isns_client_packets($1)
+ corenet_dontaudit_receive_isns_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isns_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to isns_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_isns_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isns_client_packets'($*)) dnl
+
+ gen_require(`
+ type isns_client_packet_t;
+ ')
+
+ allow $1 isns_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_isns_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send isns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_isns_server_packets'($*)) dnl
+
+ gen_require(`
+ type isns_server_packet_t;
+ ')
+
+ allow $1 isns_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send isns_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_isns_server_packets'($*)) dnl
+
+ gen_require(`
+ type isns_server_packet_t;
+ ')
+
+ dontaudit $1 isns_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive isns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_isns_server_packets'($*)) dnl
+
+ gen_require(`
+ type isns_server_packet_t;
+ ')
+
+ allow $1 isns_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive isns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_isns_server_packets'($*)) dnl
+
+ gen_require(`
+ type isns_server_packet_t;
+ ')
+
+ dontaudit $1 isns_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive isns_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_isns_server_packets'($*)) dnl
+
+ corenet_send_isns_server_packets($1)
+ corenet_receive_isns_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive isns_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_isns_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_isns_server_packets($1)
+ corenet_dontaudit_receive_isns_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_isns_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to isns_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_isns_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_isns_server_packets'($*)) dnl
+
+ gen_require(`
+ type isns_server_packet_t;
+ ')
+
+ allow $1 isns_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_isns_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the jabber_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jabber_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jabber_client_port'($*)) dnl
+
+ gen_require(`
+ type jabber_client_port_t;
+ ')
+
+ allow $1 jabber_client_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jabber_client_port'($*)) dnl
+
+ gen_require(`
+ type jabber_client_port_t;
+ ')
+
+ allow $1 jabber_client_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jabber_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the jabber_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_jabber_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jabber_client_port'($*)) dnl
+
+ gen_require(`
+ type jabber_client_port_t;
+ ')
+
+ allow $1 jabber_client_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jabber_client_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jabber_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_client_packet_t;
+ ')
+
+ allow $1 jabber_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jabber_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_client_packet_t;
+ ')
+
+ dontaudit $1 jabber_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jabber_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_client_packet_t;
+ ')
+
+ allow $1 jabber_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jabber_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_client_packet_t;
+ ')
+
+ dontaudit $1 jabber_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jabber_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_client_client_packets'($*)) dnl
+
+ corenet_send_jabber_client_client_packets($1)
+ corenet_receive_jabber_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jabber_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_client_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_jabber_client_client_packets($1)
+ corenet_dontaudit_receive_jabber_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jabber_client_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jabber_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_client_packet_t;
+ ')
+
+ allow $1 jabber_client_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_client_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jabber_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_server_packet_t;
+ ')
+
+ allow $1 jabber_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jabber_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_server_packet_t;
+ ')
+
+ dontaudit $1 jabber_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jabber_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_server_packet_t;
+ ')
+
+ allow $1 jabber_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jabber_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_server_packet_t;
+ ')
+
+ dontaudit $1 jabber_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jabber_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_client_server_packets'($*)) dnl
+
+ corenet_send_jabber_client_server_packets($1)
+ corenet_receive_jabber_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jabber_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_client_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_jabber_client_server_packets($1)
+ corenet_dontaudit_receive_jabber_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jabber_client_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jabber_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_client_server_packet_t;
+ ')
+
+ allow $1 jabber_client_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_client_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the jabber_interserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jabber_interserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jabber_interserver_port'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_port_t;
+ ')
+
+ allow $1 jabber_interserver_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jabber_interserver_port'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_port_t;
+ ')
+
+ allow $1 jabber_interserver_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jabber_interserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the jabber_interserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_jabber_interserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jabber_interserver_port'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_port_t;
+ ')
+
+ allow $1 jabber_interserver_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jabber_interserver_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jabber_interserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_interserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_client_packet_t;
+ ')
+
+ allow $1 jabber_interserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jabber_interserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_interserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_client_packet_t;
+ ')
+
+ dontaudit $1 jabber_interserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jabber_interserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_interserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_client_packet_t;
+ ')
+
+ allow $1 jabber_interserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jabber_interserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_interserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_client_packet_t;
+ ')
+
+ dontaudit $1 jabber_interserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jabber_interserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_interserver_client_packets'($*)) dnl
+
+ corenet_send_jabber_interserver_client_packets($1)
+ corenet_receive_jabber_interserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jabber_interserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_interserver_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_jabber_interserver_client_packets($1)
+ corenet_dontaudit_receive_jabber_interserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jabber_interserver_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jabber_interserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_interserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_client_packet_t;
+ ')
+
+ allow $1 jabber_interserver_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_interserver_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jabber_interserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jabber_interserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_server_packet_t;
+ ')
+
+ allow $1 jabber_interserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jabber_interserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jabber_interserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_server_packet_t;
+ ')
+
+ dontaudit $1 jabber_interserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jabber_interserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jabber_interserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_server_packet_t;
+ ')
+
+ allow $1 jabber_interserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jabber_interserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jabber_interserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_server_packet_t;
+ ')
+
+ dontaudit $1 jabber_interserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jabber_interserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jabber_interserver_server_packets'($*)) dnl
+
+ corenet_send_jabber_interserver_server_packets($1)
+ corenet_receive_jabber_interserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jabber_interserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jabber_interserver_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_jabber_interserver_server_packets($1)
+ corenet_dontaudit_receive_jabber_interserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jabber_interserver_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jabber_interserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jabber_interserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type jabber_interserver_server_packet_t;
+ ')
+
+ allow $1 jabber_interserver_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jabber_interserver_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the jboss_iiop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_jboss_iiop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_jboss_iiop_port'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_port_t;
+ ')
+
+ allow $1 jboss_iiop_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_jboss_iiop_port'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_port_t;
+ ')
+
+ allow $1 jboss_iiop_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_jboss_iiop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the jboss_iiop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_jboss_iiop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_jboss_iiop_port'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_port_t;
+ ')
+
+ allow $1 jboss_iiop_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_jboss_iiop_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jboss_iiop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jboss_iiop_client_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_client_packet_t;
+ ')
+
+ allow $1 jboss_iiop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jboss_iiop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jboss_iiop_client_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_client_packet_t;
+ ')
+
+ dontaudit $1 jboss_iiop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jboss_iiop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jboss_iiop_client_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_client_packet_t;
+ ')
+
+ allow $1 jboss_iiop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jboss_iiop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jboss_iiop_client_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_client_packet_t;
+ ')
+
+ dontaudit $1 jboss_iiop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jboss_iiop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jboss_iiop_client_packets'($*)) dnl
+
+ corenet_send_jboss_iiop_client_packets($1)
+ corenet_receive_jboss_iiop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jboss_iiop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jboss_iiop_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_jboss_iiop_client_packets($1)
+ corenet_dontaudit_receive_jboss_iiop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jboss_iiop_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jboss_iiop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jboss_iiop_client_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_client_packet_t;
+ ')
+
+ allow $1 jboss_iiop_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jboss_iiop_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send jboss_iiop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_jboss_iiop_server_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_server_packet_t;
+ ')
+
+ allow $1 jboss_iiop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send jboss_iiop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_jboss_iiop_server_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_server_packet_t;
+ ')
+
+ dontaudit $1 jboss_iiop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive jboss_iiop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_jboss_iiop_server_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_server_packet_t;
+ ')
+
+ allow $1 jboss_iiop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive jboss_iiop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_jboss_iiop_server_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_server_packet_t;
+ ')
+
+ dontaudit $1 jboss_iiop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive jboss_iiop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_jboss_iiop_server_packets'($*)) dnl
+
+ corenet_send_jboss_iiop_server_packets($1)
+ corenet_receive_jboss_iiop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive jboss_iiop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_jboss_iiop_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_jboss_iiop_server_packets($1)
+ corenet_dontaudit_receive_jboss_iiop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to jboss_iiop_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_jboss_iiop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_jboss_iiop_server_packets'($*)) dnl
+
+ gen_require(`
+ type jboss_iiop_server_packet_t;
+ ')
+
+ allow $1 jboss_iiop_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_jboss_iiop_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kerberos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kerberos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kerberos port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_port_t;
+ ')
+
+ allow $1 kerberos_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_port_t;
+ ')
+
+ allow $1 kerberos_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kerberos port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kerberos_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_port_t;
+ ')
+
+ allow $1 kerberos_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_client_packet_t;
+ ')
+
+ allow $1 kerberos_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_client_packet_t;
+ ')
+
+ allow $1 kerberos_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_client_packets'($*)) dnl
+
+ corenet_send_kerberos_client_packets($1)
+ corenet_receive_kerberos_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_client_packets($1)
+ corenet_dontaudit_receive_kerberos_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_client_packet_t;
+ ')
+
+ allow $1 kerberos_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_server_packet_t;
+ ')
+
+ allow $1 kerberos_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_server_packet_t;
+ ')
+
+ allow $1 kerberos_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_server_packets'($*)) dnl
+
+ corenet_send_kerberos_server_packets($1)
+ corenet_receive_kerberos_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_server_packets($1)
+ corenet_dontaudit_receive_kerberos_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_server_packet_t;
+ ')
+
+ allow $1 kerberos_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kerberos_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_admin_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_port_t;
+ ')
+
+ allow $1 kerberos_admin_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_admin_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_port_t;
+ ')
+
+ allow $1 kerberos_admin_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kerberos_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kerberos_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_admin_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_port_t;
+ ')
+
+ allow $1 kerberos_admin_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_admin_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_client_packet_t;
+ ')
+
+ allow $1 kerberos_admin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_admin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_admin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_client_packet_t;
+ ')
+
+ allow $1 kerberos_admin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_admin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_admin_client_packets'($*)) dnl
+
+ corenet_send_kerberos_admin_client_packets($1)
+ corenet_receive_kerberos_admin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_admin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_admin_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_admin_client_packets($1)
+ corenet_dontaudit_receive_kerberos_admin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_admin_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_client_packet_t;
+ ')
+
+ allow $1 kerberos_admin_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_admin_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_server_packet_t;
+ ')
+
+ allow $1 kerberos_admin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_admin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_admin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_server_packet_t;
+ ')
+
+ allow $1 kerberos_admin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_admin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_admin_server_packets'($*)) dnl
+
+ corenet_send_kerberos_admin_server_packets($1)
+ corenet_receive_kerberos_admin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_admin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_admin_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_admin_server_packets($1)
+ corenet_dontaudit_receive_kerberos_admin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_admin_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_admin_server_packet_t;
+ ')
+
+ allow $1 kerberos_admin_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_admin_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kerberos_master port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kerberos_master_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kerberos_master_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_port_t;
+ ')
+
+ allow $1 kerberos_master_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kerberos_master_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_port_t;
+ ')
+
+ allow $1 kerberos_master_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kerberos_master_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kerberos_master port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kerberos_master_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kerberos_master_port'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_port_t;
+ ')
+
+ allow $1 kerberos_master_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kerberos_master_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_master_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_master_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_client_packet_t;
+ ')
+
+ allow $1 kerberos_master_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_master_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_master_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_master_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_master_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_master_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_client_packet_t;
+ ')
+
+ allow $1 kerberos_master_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_master_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_master_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_client_packet_t;
+ ')
+
+ dontaudit $1 kerberos_master_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_master_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_master_client_packets'($*)) dnl
+
+ corenet_send_kerberos_master_client_packets($1)
+ corenet_receive_kerberos_master_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_master_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_master_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_master_client_packets($1)
+ corenet_dontaudit_receive_kerberos_master_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_master_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_master_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_master_client_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_client_packet_t;
+ ')
+
+ allow $1 kerberos_master_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_master_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kerberos_master_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kerberos_master_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_server_packet_t;
+ ')
+
+ allow $1 kerberos_master_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kerberos_master_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kerberos_master_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_master_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kerberos_master_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kerberos_master_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_server_packet_t;
+ ')
+
+ allow $1 kerberos_master_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kerberos_master_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kerberos_master_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_server_packet_t;
+ ')
+
+ dontaudit $1 kerberos_master_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kerberos_master_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kerberos_master_server_packets'($*)) dnl
+
+ corenet_send_kerberos_master_server_packets($1)
+ corenet_receive_kerberos_master_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kerberos_master_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kerberos_master_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kerberos_master_server_packets($1)
+ corenet_dontaudit_receive_kerberos_master_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kerberos_master_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kerberos_master_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kerberos_master_server_packets'($*)) dnl
+
+ gen_require(`
+ type kerberos_master_server_packet_t;
+ ')
+
+ allow $1 kerberos_master_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kerberos_master_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kismet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kismet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kismet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kismet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kismet_port'($*)) dnl
+
+ gen_require(`
+ type kismet_port_t;
+ ')
+
+ allow $1 kismet_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kismet_port'($*)) dnl
+
+ gen_require(`
+ type kismet_port_t;
+ ')
+
+ allow $1 kismet_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kismet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kismet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kismet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kismet_port'($*)) dnl
+
+ gen_require(`
+ type kismet_port_t;
+ ')
+
+ allow $1 kismet_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kismet_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kismet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kismet_client_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_client_packet_t;
+ ')
+
+ allow $1 kismet_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kismet_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kismet_client_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_client_packet_t;
+ ')
+
+ dontaudit $1 kismet_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kismet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kismet_client_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_client_packet_t;
+ ')
+
+ allow $1 kismet_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kismet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kismet_client_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_client_packet_t;
+ ')
+
+ dontaudit $1 kismet_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kismet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kismet_client_packets'($*)) dnl
+
+ corenet_send_kismet_client_packets($1)
+ corenet_receive_kismet_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kismet_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kismet_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kismet_client_packets($1)
+ corenet_dontaudit_receive_kismet_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kismet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kismet_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kismet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kismet_client_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_client_packet_t;
+ ')
+
+ allow $1 kismet_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kismet_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kismet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kismet_server_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_server_packet_t;
+ ')
+
+ allow $1 kismet_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kismet_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kismet_server_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_server_packet_t;
+ ')
+
+ dontaudit $1 kismet_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kismet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kismet_server_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_server_packet_t;
+ ')
+
+ allow $1 kismet_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kismet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kismet_server_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_server_packet_t;
+ ')
+
+ dontaudit $1 kismet_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kismet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kismet_server_packets'($*)) dnl
+
+ corenet_send_kismet_server_packets($1)
+ corenet_receive_kismet_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kismet_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kismet_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kismet_server_packets($1)
+ corenet_dontaudit_receive_kismet_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kismet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kismet_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kismet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kismet_server_packets'($*)) dnl
+
+ gen_require(`
+ type kismet_server_packet_t;
+ ')
+
+ allow $1 kismet_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kismet_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kdeconnect port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kdeconnect_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kdeconnect_port'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_port_t;
+ ')
+
+ allow $1 kdeconnect_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kdeconnect_port'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_port_t;
+ ')
+
+ allow $1 kdeconnect_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kdeconnect_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kdeconnect port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kdeconnect_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kdeconnect_port'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_port_t;
+ ')
+
+ allow $1 kdeconnect_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kdeconnect_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kdeconnect_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kdeconnect_client_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_client_packet_t;
+ ')
+
+ allow $1 kdeconnect_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kdeconnect_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kdeconnect_client_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_client_packet_t;
+ ')
+
+ dontaudit $1 kdeconnect_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kdeconnect_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kdeconnect_client_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_client_packet_t;
+ ')
+
+ allow $1 kdeconnect_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kdeconnect_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kdeconnect_client_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_client_packet_t;
+ ')
+
+ dontaudit $1 kdeconnect_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kdeconnect_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kdeconnect_client_packets'($*)) dnl
+
+ corenet_send_kdeconnect_client_packets($1)
+ corenet_receive_kdeconnect_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kdeconnect_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kdeconnect_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kdeconnect_client_packets($1)
+ corenet_dontaudit_receive_kdeconnect_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kdeconnect_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kdeconnect_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kdeconnect_client_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_client_packet_t;
+ ')
+
+ allow $1 kdeconnect_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kdeconnect_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kdeconnect_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kdeconnect_server_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_server_packet_t;
+ ')
+
+ allow $1 kdeconnect_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kdeconnect_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kdeconnect_server_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_server_packet_t;
+ ')
+
+ dontaudit $1 kdeconnect_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kdeconnect_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kdeconnect_server_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_server_packet_t;
+ ')
+
+ allow $1 kdeconnect_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kdeconnect_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kdeconnect_server_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_server_packet_t;
+ ')
+
+ dontaudit $1 kdeconnect_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kdeconnect_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kdeconnect_server_packets'($*)) dnl
+
+ corenet_send_kdeconnect_server_packets($1)
+ corenet_receive_kdeconnect_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kdeconnect_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kdeconnect_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kdeconnect_server_packets($1)
+ corenet_dontaudit_receive_kdeconnect_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kdeconnect_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kdeconnect_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kdeconnect_server_packets'($*)) dnl
+
+ gen_require(`
+ type kdeconnect_server_packet_t;
+ ')
+
+ allow $1 kdeconnect_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kdeconnect_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the kprop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the kprop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the kprop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_kprop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_kprop_port'($*)) dnl
+
+ gen_require(`
+ type kprop_port_t;
+ ')
+
+ allow $1 kprop_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_kprop_port'($*)) dnl
+
+ gen_require(`
+ type kprop_port_t;
+ ')
+
+ allow $1 kprop_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_kprop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the kprop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_kprop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_kprop_port'($*)) dnl
+
+ gen_require(`
+ type kprop_port_t;
+ ')
+
+ allow $1 kprop_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_kprop_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kprop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kprop_client_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_client_packet_t;
+ ')
+
+ allow $1 kprop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kprop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kprop_client_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_client_packet_t;
+ ')
+
+ dontaudit $1 kprop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kprop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kprop_client_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_client_packet_t;
+ ')
+
+ allow $1 kprop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kprop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kprop_client_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_client_packet_t;
+ ')
+
+ dontaudit $1 kprop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kprop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kprop_client_packets'($*)) dnl
+
+ corenet_send_kprop_client_packets($1)
+ corenet_receive_kprop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kprop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kprop_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_kprop_client_packets($1)
+ corenet_dontaudit_receive_kprop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kprop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kprop_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kprop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kprop_client_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_client_packet_t;
+ ')
+
+ allow $1 kprop_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kprop_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send kprop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_kprop_server_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_server_packet_t;
+ ')
+
+ allow $1 kprop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send kprop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_kprop_server_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_server_packet_t;
+ ')
+
+ dontaudit $1 kprop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive kprop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_kprop_server_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_server_packet_t;
+ ')
+
+ allow $1 kprop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive kprop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_kprop_server_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_server_packet_t;
+ ')
+
+ dontaudit $1 kprop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive kprop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_kprop_server_packets'($*)) dnl
+
+ corenet_send_kprop_server_packets($1)
+ corenet_receive_kprop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive kprop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_kprop_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_kprop_server_packets($1)
+ corenet_dontaudit_receive_kprop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_kprop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to kprop_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_kprop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_kprop_server_packets'($*)) dnl
+
+ gen_require(`
+ type kprop_server_packet_t;
+ ')
+
+ allow $1 kprop_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_kprop_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ktalkd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ktalkd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ktalkd_port'($*)) dnl
+
+ gen_require(`
+ type ktalkd_port_t;
+ ')
+
+ allow $1 ktalkd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ktalkd_port'($*)) dnl
+
+ gen_require(`
+ type ktalkd_port_t;
+ ')
+
+ allow $1 ktalkd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ktalkd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ktalkd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ktalkd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ktalkd_port'($*)) dnl
+
+ gen_require(`
+ type ktalkd_port_t;
+ ')
+
+ allow $1 ktalkd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ktalkd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ktalkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ktalkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_client_packet_t;
+ ')
+
+ allow $1 ktalkd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ktalkd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ktalkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_client_packet_t;
+ ')
+
+ dontaudit $1 ktalkd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ktalkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ktalkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_client_packet_t;
+ ')
+
+ allow $1 ktalkd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ktalkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ktalkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_client_packet_t;
+ ')
+
+ dontaudit $1 ktalkd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ktalkd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ktalkd_client_packets'($*)) dnl
+
+ corenet_send_ktalkd_client_packets($1)
+ corenet_receive_ktalkd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ktalkd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ktalkd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ktalkd_client_packets($1)
+ corenet_dontaudit_receive_ktalkd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ktalkd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ktalkd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ktalkd_client_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_client_packet_t;
+ ')
+
+ allow $1 ktalkd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ktalkd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ktalkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ktalkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_server_packet_t;
+ ')
+
+ allow $1 ktalkd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ktalkd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ktalkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_server_packet_t;
+ ')
+
+ dontaudit $1 ktalkd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ktalkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ktalkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_server_packet_t;
+ ')
+
+ allow $1 ktalkd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ktalkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ktalkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_server_packet_t;
+ ')
+
+ dontaudit $1 ktalkd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ktalkd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ktalkd_server_packets'($*)) dnl
+
+ corenet_send_ktalkd_server_packets($1)
+ corenet_receive_ktalkd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ktalkd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ktalkd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ktalkd_server_packets($1)
+ corenet_dontaudit_receive_ktalkd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ktalkd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ktalkd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ktalkd_server_packets'($*)) dnl
+
+ gen_require(`
+ type ktalkd_server_packet_t;
+ ')
+
+ allow $1 ktalkd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ktalkd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the l2tp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the l2tp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the l2tp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_l2tp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_l2tp_port'($*)) dnl
+
+ gen_require(`
+ type l2tp_port_t;
+ ')
+
+ allow $1 l2tp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_l2tp_port'($*)) dnl
+
+ gen_require(`
+ type l2tp_port_t;
+ ')
+
+ allow $1 l2tp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_l2tp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the l2tp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_l2tp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_l2tp_port'($*)) dnl
+
+ gen_require(`
+ type l2tp_port_t;
+ ')
+
+ allow $1 l2tp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_l2tp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send l2tp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_l2tp_client_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_client_packet_t;
+ ')
+
+ allow $1 l2tp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send l2tp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_l2tp_client_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_client_packet_t;
+ ')
+
+ dontaudit $1 l2tp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive l2tp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_l2tp_client_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_client_packet_t;
+ ')
+
+ allow $1 l2tp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive l2tp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_l2tp_client_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_client_packet_t;
+ ')
+
+ dontaudit $1 l2tp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive l2tp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_l2tp_client_packets'($*)) dnl
+
+ corenet_send_l2tp_client_packets($1)
+ corenet_receive_l2tp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive l2tp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_l2tp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_l2tp_client_packets($1)
+ corenet_dontaudit_receive_l2tp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_l2tp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to l2tp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_l2tp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_l2tp_client_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_client_packet_t;
+ ')
+
+ allow $1 l2tp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_l2tp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send l2tp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_l2tp_server_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_server_packet_t;
+ ')
+
+ allow $1 l2tp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send l2tp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_l2tp_server_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_server_packet_t;
+ ')
+
+ dontaudit $1 l2tp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive l2tp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_l2tp_server_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_server_packet_t;
+ ')
+
+ allow $1 l2tp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive l2tp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_l2tp_server_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_server_packet_t;
+ ')
+
+ dontaudit $1 l2tp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive l2tp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_l2tp_server_packets'($*)) dnl
+
+ corenet_send_l2tp_server_packets($1)
+ corenet_receive_l2tp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive l2tp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_l2tp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_l2tp_server_packets($1)
+ corenet_dontaudit_receive_l2tp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_l2tp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to l2tp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_l2tp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_l2tp_server_packets'($*)) dnl
+
+ gen_require(`
+ type l2tp_server_packet_t;
+ ')
+
+ allow $1 l2tp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_l2tp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ldap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ldap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ldap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ldap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ldap_port'($*)) dnl
+
+ gen_require(`
+ type ldap_port_t;
+ ')
+
+ allow $1 ldap_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ldap_port'($*)) dnl
+
+ gen_require(`
+ type ldap_port_t;
+ ')
+
+ allow $1 ldap_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ldap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ldap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ldap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ldap_port'($*)) dnl
+
+ gen_require(`
+ type ldap_port_t;
+ ')
+
+ allow $1 ldap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ldap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ldap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ldap_client_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_client_packet_t;
+ ')
+
+ allow $1 ldap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ldap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ldap_client_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_client_packet_t;
+ ')
+
+ dontaudit $1 ldap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ldap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ldap_client_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_client_packet_t;
+ ')
+
+ allow $1 ldap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ldap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ldap_client_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_client_packet_t;
+ ')
+
+ dontaudit $1 ldap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ldap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ldap_client_packets'($*)) dnl
+
+ corenet_send_ldap_client_packets($1)
+ corenet_receive_ldap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ldap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ldap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ldap_client_packets($1)
+ corenet_dontaudit_receive_ldap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ldap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ldap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ldap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ldap_client_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_client_packet_t;
+ ')
+
+ allow $1 ldap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ldap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ldap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ldap_server_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_server_packet_t;
+ ')
+
+ allow $1 ldap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ldap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ldap_server_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_server_packet_t;
+ ')
+
+ dontaudit $1 ldap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ldap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ldap_server_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_server_packet_t;
+ ')
+
+ allow $1 ldap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ldap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ldap_server_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_server_packet_t;
+ ')
+
+ dontaudit $1 ldap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ldap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ldap_server_packets'($*)) dnl
+
+ corenet_send_ldap_server_packets($1)
+ corenet_receive_ldap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ldap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ldap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ldap_server_packets($1)
+ corenet_dontaudit_receive_ldap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ldap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ldap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ldap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ldap_server_packets'($*)) dnl
+
+ gen_require(`
+ type ldap_server_packet_t;
+ ')
+
+ allow $1 ldap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ldap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the lirc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the lirc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the lirc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lirc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lirc_port'($*)) dnl
+
+ gen_require(`
+ type lirc_port_t;
+ ')
+
+ allow $1 lirc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lirc_port'($*)) dnl
+
+ gen_require(`
+ type lirc_port_t;
+ ')
+
+ allow $1 lirc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lirc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the lirc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_lirc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lirc_port'($*)) dnl
+
+ gen_require(`
+ type lirc_port_t;
+ ')
+
+ allow $1 lirc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lirc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lirc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lirc_client_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_client_packet_t;
+ ')
+
+ allow $1 lirc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lirc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lirc_client_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_client_packet_t;
+ ')
+
+ dontaudit $1 lirc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lirc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lirc_client_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_client_packet_t;
+ ')
+
+ allow $1 lirc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lirc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lirc_client_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_client_packet_t;
+ ')
+
+ dontaudit $1 lirc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lirc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lirc_client_packets'($*)) dnl
+
+ corenet_send_lirc_client_packets($1)
+ corenet_receive_lirc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lirc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lirc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_lirc_client_packets($1)
+ corenet_dontaudit_receive_lirc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lirc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lirc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lirc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lirc_client_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_client_packet_t;
+ ')
+
+ allow $1 lirc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lirc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lirc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lirc_server_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_server_packet_t;
+ ')
+
+ allow $1 lirc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lirc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lirc_server_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_server_packet_t;
+ ')
+
+ dontaudit $1 lirc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lirc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lirc_server_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_server_packet_t;
+ ')
+
+ allow $1 lirc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lirc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lirc_server_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_server_packet_t;
+ ')
+
+ dontaudit $1 lirc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lirc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lirc_server_packets'($*)) dnl
+
+ corenet_send_lirc_server_packets($1)
+ corenet_receive_lirc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lirc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lirc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_lirc_server_packets($1)
+ corenet_dontaudit_receive_lirc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lirc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lirc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lirc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lirc_server_packets'($*)) dnl
+
+ gen_require(`
+ type lirc_server_packet_t;
+ ')
+
+ allow $1 lirc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lirc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the llmnr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the llmnr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the llmnr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_llmnr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_llmnr_port'($*)) dnl
+
+ gen_require(`
+ type llmnr_port_t;
+ ')
+
+ allow $1 llmnr_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_llmnr_port'($*)) dnl
+
+ gen_require(`
+ type llmnr_port_t;
+ ')
+
+ allow $1 llmnr_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_llmnr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the llmnr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_llmnr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_llmnr_port'($*)) dnl
+
+ gen_require(`
+ type llmnr_port_t;
+ ')
+
+ allow $1 llmnr_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_llmnr_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send llmnr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_llmnr_client_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_client_packet_t;
+ ')
+
+ allow $1 llmnr_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send llmnr_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_llmnr_client_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_client_packet_t;
+ ')
+
+ dontaudit $1 llmnr_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive llmnr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_llmnr_client_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_client_packet_t;
+ ')
+
+ allow $1 llmnr_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive llmnr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_llmnr_client_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_client_packet_t;
+ ')
+
+ dontaudit $1 llmnr_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive llmnr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_llmnr_client_packets'($*)) dnl
+
+ corenet_send_llmnr_client_packets($1)
+ corenet_receive_llmnr_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive llmnr_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_llmnr_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_llmnr_client_packets($1)
+ corenet_dontaudit_receive_llmnr_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_llmnr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to llmnr_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_llmnr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_llmnr_client_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_client_packet_t;
+ ')
+
+ allow $1 llmnr_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_llmnr_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send llmnr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_llmnr_server_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_server_packet_t;
+ ')
+
+ allow $1 llmnr_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send llmnr_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_llmnr_server_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_server_packet_t;
+ ')
+
+ dontaudit $1 llmnr_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive llmnr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_llmnr_server_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_server_packet_t;
+ ')
+
+ allow $1 llmnr_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive llmnr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_llmnr_server_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_server_packet_t;
+ ')
+
+ dontaudit $1 llmnr_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive llmnr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_llmnr_server_packets'($*)) dnl
+
+ corenet_send_llmnr_server_packets($1)
+ corenet_receive_llmnr_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive llmnr_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_llmnr_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_llmnr_server_packets($1)
+ corenet_dontaudit_receive_llmnr_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_llmnr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to llmnr_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_llmnr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_llmnr_server_packets'($*)) dnl
+
+ gen_require(`
+ type llmnr_server_packet_t;
+ ')
+
+ allow $1 llmnr_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_llmnr_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the lmtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the lmtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the lmtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lmtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lmtp_port'($*)) dnl
+
+ gen_require(`
+ type lmtp_port_t;
+ ')
+
+ allow $1 lmtp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lmtp_port'($*)) dnl
+
+ gen_require(`
+ type lmtp_port_t;
+ ')
+
+ allow $1 lmtp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lmtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the lmtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_lmtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lmtp_port'($*)) dnl
+
+ gen_require(`
+ type lmtp_port_t;
+ ')
+
+ allow $1 lmtp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lmtp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lmtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lmtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_client_packet_t;
+ ')
+
+ allow $1 lmtp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lmtp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lmtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_client_packet_t;
+ ')
+
+ dontaudit $1 lmtp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lmtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lmtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_client_packet_t;
+ ')
+
+ allow $1 lmtp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lmtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lmtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_client_packet_t;
+ ')
+
+ dontaudit $1 lmtp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lmtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lmtp_client_packets'($*)) dnl
+
+ corenet_send_lmtp_client_packets($1)
+ corenet_receive_lmtp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lmtp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lmtp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_lmtp_client_packets($1)
+ corenet_dontaudit_receive_lmtp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lmtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lmtp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lmtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lmtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_client_packet_t;
+ ')
+
+ allow $1 lmtp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lmtp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lmtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lmtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_server_packet_t;
+ ')
+
+ allow $1 lmtp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lmtp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lmtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_server_packet_t;
+ ')
+
+ dontaudit $1 lmtp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lmtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lmtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_server_packet_t;
+ ')
+
+ allow $1 lmtp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lmtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lmtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_server_packet_t;
+ ')
+
+ dontaudit $1 lmtp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lmtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lmtp_server_packets'($*)) dnl
+
+ corenet_send_lmtp_server_packets($1)
+ corenet_receive_lmtp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lmtp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lmtp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_lmtp_server_packets($1)
+ corenet_dontaudit_receive_lmtp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lmtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lmtp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lmtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lmtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type lmtp_server_packet_t;
+ ')
+
+ allow $1 lmtp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lmtp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the lrrd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the lrrd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the lrrd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_lrrd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_lrrd_port'($*)) dnl
+
+ gen_require(`
+ type lrrd_port_t;
+ ')
+
+ allow $1 lrrd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_lrrd_port'($*)) dnl
+
+ gen_require(`
+ type lrrd_port_t;
+ ')
+
+ allow $1 lrrd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_lrrd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the lrrd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_lrrd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_lrrd_port'($*)) dnl
+
+ gen_require(`
+ type lrrd_port_t;
+ ')
+
+ allow $1 lrrd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_lrrd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lrrd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lrrd_client_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_client_packet_t;
+ ')
+
+ allow $1 lrrd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lrrd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lrrd_client_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_client_packet_t;
+ ')
+
+ dontaudit $1 lrrd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lrrd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lrrd_client_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_client_packet_t;
+ ')
+
+ allow $1 lrrd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lrrd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lrrd_client_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_client_packet_t;
+ ')
+
+ dontaudit $1 lrrd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lrrd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lrrd_client_packets'($*)) dnl
+
+ corenet_send_lrrd_client_packets($1)
+ corenet_receive_lrrd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lrrd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lrrd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_lrrd_client_packets($1)
+ corenet_dontaudit_receive_lrrd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lrrd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lrrd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lrrd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lrrd_client_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_client_packet_t;
+ ')
+
+ allow $1 lrrd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lrrd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send lrrd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_lrrd_server_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_server_packet_t;
+ ')
+
+ allow $1 lrrd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send lrrd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_lrrd_server_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_server_packet_t;
+ ')
+
+ dontaudit $1 lrrd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive lrrd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_lrrd_server_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_server_packet_t;
+ ')
+
+ allow $1 lrrd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive lrrd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_lrrd_server_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_server_packet_t;
+ ')
+
+ dontaudit $1 lrrd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive lrrd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_lrrd_server_packets'($*)) dnl
+
+ corenet_send_lrrd_server_packets($1)
+ corenet_receive_lrrd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive lrrd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_lrrd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_lrrd_server_packets($1)
+ corenet_dontaudit_receive_lrrd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_lrrd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to lrrd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_lrrd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_lrrd_server_packets'($*)) dnl
+
+ gen_require(`
+ type lrrd_server_packet_t;
+ ')
+
+ allow $1 lrrd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_lrrd_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mail port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mail port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mail port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mail_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mail_port'($*)) dnl
+
+ gen_require(`
+ type mail_port_t;
+ ')
+
+ allow $1 mail_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mail_port'($*)) dnl
+
+ gen_require(`
+ type mail_port_t;
+ ')
+
+ allow $1 mail_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mail_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mail port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mail_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mail_port'($*)) dnl
+
+ gen_require(`
+ type mail_port_t;
+ ')
+
+ allow $1 mail_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mail_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mail_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mail_client_packets'($*)) dnl
+
+ gen_require(`
+ type mail_client_packet_t;
+ ')
+
+ allow $1 mail_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mail_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mail_client_packets'($*)) dnl
+
+ gen_require(`
+ type mail_client_packet_t;
+ ')
+
+ dontaudit $1 mail_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mail_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mail_client_packets'($*)) dnl
+
+ gen_require(`
+ type mail_client_packet_t;
+ ')
+
+ allow $1 mail_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mail_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mail_client_packets'($*)) dnl
+
+ gen_require(`
+ type mail_client_packet_t;
+ ')
+
+ dontaudit $1 mail_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mail_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mail_client_packets'($*)) dnl
+
+ corenet_send_mail_client_packets($1)
+ corenet_receive_mail_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mail_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mail_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mail_client_packets($1)
+ corenet_dontaudit_receive_mail_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mail_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mail_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mail_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mail_client_packets'($*)) dnl
+
+ gen_require(`
+ type mail_client_packet_t;
+ ')
+
+ allow $1 mail_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mail_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mail_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mail_server_packets'($*)) dnl
+
+ gen_require(`
+ type mail_server_packet_t;
+ ')
+
+ allow $1 mail_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mail_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mail_server_packets'($*)) dnl
+
+ gen_require(`
+ type mail_server_packet_t;
+ ')
+
+ dontaudit $1 mail_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mail_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mail_server_packets'($*)) dnl
+
+ gen_require(`
+ type mail_server_packet_t;
+ ')
+
+ allow $1 mail_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mail_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mail_server_packets'($*)) dnl
+
+ gen_require(`
+ type mail_server_packet_t;
+ ')
+
+ dontaudit $1 mail_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mail_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mail_server_packets'($*)) dnl
+
+ corenet_send_mail_server_packets($1)
+ corenet_receive_mail_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mail_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mail_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mail_server_packets($1)
+ corenet_dontaudit_receive_mail_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mail_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mail_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mail_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mail_server_packets'($*)) dnl
+
+ gen_require(`
+ type mail_server_packet_t;
+ ')
+
+ allow $1 mail_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mail_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the matahari port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the matahari port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the matahari port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_matahari_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_matahari_port'($*)) dnl
+
+ gen_require(`
+ type matahari_port_t;
+ ')
+
+ allow $1 matahari_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_matahari_port'($*)) dnl
+
+ gen_require(`
+ type matahari_port_t;
+ ')
+
+ allow $1 matahari_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_matahari_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the matahari port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_matahari_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_matahari_port'($*)) dnl
+
+ gen_require(`
+ type matahari_port_t;
+ ')
+
+ allow $1 matahari_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_matahari_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send matahari_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_matahari_client_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_client_packet_t;
+ ')
+
+ allow $1 matahari_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send matahari_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_matahari_client_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_client_packet_t;
+ ')
+
+ dontaudit $1 matahari_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive matahari_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_matahari_client_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_client_packet_t;
+ ')
+
+ allow $1 matahari_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive matahari_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_matahari_client_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_client_packet_t;
+ ')
+
+ dontaudit $1 matahari_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive matahari_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_matahari_client_packets'($*)) dnl
+
+ corenet_send_matahari_client_packets($1)
+ corenet_receive_matahari_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive matahari_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_matahari_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_matahari_client_packets($1)
+ corenet_dontaudit_receive_matahari_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_matahari_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to matahari_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_matahari_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_matahari_client_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_client_packet_t;
+ ')
+
+ allow $1 matahari_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_matahari_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send matahari_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_matahari_server_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_server_packet_t;
+ ')
+
+ allow $1 matahari_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send matahari_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_matahari_server_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_server_packet_t;
+ ')
+
+ dontaudit $1 matahari_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive matahari_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_matahari_server_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_server_packet_t;
+ ')
+
+ allow $1 matahari_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive matahari_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_matahari_server_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_server_packet_t;
+ ')
+
+ dontaudit $1 matahari_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive matahari_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_matahari_server_packets'($*)) dnl
+
+ corenet_send_matahari_server_packets($1)
+ corenet_receive_matahari_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive matahari_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_matahari_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_matahari_server_packets($1)
+ corenet_dontaudit_receive_matahari_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_matahari_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to matahari_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_matahari_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_matahari_server_packets'($*)) dnl
+
+ gen_require(`
+ type matahari_server_packet_t;
+ ')
+
+ allow $1 matahari_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_matahari_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the memcache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the memcache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the memcache port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_memcache_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_memcache_port'($*)) dnl
+
+ gen_require(`
+ type memcache_port_t;
+ ')
+
+ allow $1 memcache_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_memcache_port'($*)) dnl
+
+ gen_require(`
+ type memcache_port_t;
+ ')
+
+ allow $1 memcache_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_memcache_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the memcache port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_memcache_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_memcache_port'($*)) dnl
+
+ gen_require(`
+ type memcache_port_t;
+ ')
+
+ allow $1 memcache_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_memcache_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send memcache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_memcache_client_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_client_packet_t;
+ ')
+
+ allow $1 memcache_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send memcache_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_memcache_client_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_client_packet_t;
+ ')
+
+ dontaudit $1 memcache_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive memcache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_memcache_client_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_client_packet_t;
+ ')
+
+ allow $1 memcache_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive memcache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_memcache_client_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_client_packet_t;
+ ')
+
+ dontaudit $1 memcache_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive memcache_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_memcache_client_packets'($*)) dnl
+
+ corenet_send_memcache_client_packets($1)
+ corenet_receive_memcache_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive memcache_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_memcache_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_memcache_client_packets($1)
+ corenet_dontaudit_receive_memcache_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_memcache_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to memcache_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_memcache_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_memcache_client_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_client_packet_t;
+ ')
+
+ allow $1 memcache_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_memcache_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send memcache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_memcache_server_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_server_packet_t;
+ ')
+
+ allow $1 memcache_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send memcache_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_memcache_server_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_server_packet_t;
+ ')
+
+ dontaudit $1 memcache_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive memcache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_memcache_server_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_server_packet_t;
+ ')
+
+ allow $1 memcache_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive memcache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_memcache_server_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_server_packet_t;
+ ')
+
+ dontaudit $1 memcache_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive memcache_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_memcache_server_packets'($*)) dnl
+
+ corenet_send_memcache_server_packets($1)
+ corenet_receive_memcache_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive memcache_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_memcache_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_memcache_server_packets($1)
+ corenet_dontaudit_receive_memcache_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_memcache_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to memcache_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_memcache_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_memcache_server_packets'($*)) dnl
+
+ gen_require(`
+ type memcache_server_packet_t;
+ ')
+
+ allow $1 memcache_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_memcache_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the milter port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the milter port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the milter port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_milter_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_milter_port'($*)) dnl
+
+ gen_require(`
+ type milter_port_t;
+ ')
+
+ allow $1 milter_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_milter_port'($*)) dnl
+
+ gen_require(`
+ type milter_port_t;
+ ')
+
+ allow $1 milter_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_milter_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the milter port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_milter_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_milter_port'($*)) dnl
+
+ gen_require(`
+ type milter_port_t;
+ ')
+
+ allow $1 milter_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_milter_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send milter_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_milter_client_packets'($*)) dnl
+
+ gen_require(`
+ type milter_client_packet_t;
+ ')
+
+ allow $1 milter_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send milter_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_milter_client_packets'($*)) dnl
+
+ gen_require(`
+ type milter_client_packet_t;
+ ')
+
+ dontaudit $1 milter_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive milter_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_milter_client_packets'($*)) dnl
+
+ gen_require(`
+ type milter_client_packet_t;
+ ')
+
+ allow $1 milter_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive milter_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_milter_client_packets'($*)) dnl
+
+ gen_require(`
+ type milter_client_packet_t;
+ ')
+
+ dontaudit $1 milter_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive milter_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_milter_client_packets'($*)) dnl
+
+ corenet_send_milter_client_packets($1)
+ corenet_receive_milter_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive milter_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_milter_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_milter_client_packets($1)
+ corenet_dontaudit_receive_milter_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_milter_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to milter_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_milter_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_milter_client_packets'($*)) dnl
+
+ gen_require(`
+ type milter_client_packet_t;
+ ')
+
+ allow $1 milter_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_milter_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send milter_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_milter_server_packets'($*)) dnl
+
+ gen_require(`
+ type milter_server_packet_t;
+ ')
+
+ allow $1 milter_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send milter_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_milter_server_packets'($*)) dnl
+
+ gen_require(`
+ type milter_server_packet_t;
+ ')
+
+ dontaudit $1 milter_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive milter_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_milter_server_packets'($*)) dnl
+
+ gen_require(`
+ type milter_server_packet_t;
+ ')
+
+ allow $1 milter_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive milter_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_milter_server_packets'($*)) dnl
+
+ gen_require(`
+ type milter_server_packet_t;
+ ')
+
+ dontaudit $1 milter_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive milter_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_milter_server_packets'($*)) dnl
+
+ corenet_send_milter_server_packets($1)
+ corenet_receive_milter_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive milter_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_milter_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_milter_server_packets($1)
+ corenet_dontaudit_receive_milter_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_milter_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to milter_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_milter_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_milter_server_packets'($*)) dnl
+
+ gen_require(`
+ type milter_server_packet_t;
+ ')
+
+ allow $1 milter_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_milter_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mmcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mmcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mmcc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mmcc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mmcc_port'($*)) dnl
+
+ gen_require(`
+ type mmcc_port_t;
+ ')
+
+ allow $1 mmcc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mmcc_port'($*)) dnl
+
+ gen_require(`
+ type mmcc_port_t;
+ ')
+
+ allow $1 mmcc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mmcc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mmcc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mmcc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mmcc_port'($*)) dnl
+
+ gen_require(`
+ type mmcc_port_t;
+ ')
+
+ allow $1 mmcc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mmcc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mmcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mmcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_client_packet_t;
+ ')
+
+ allow $1 mmcc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mmcc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mmcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_client_packet_t;
+ ')
+
+ dontaudit $1 mmcc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mmcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mmcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_client_packet_t;
+ ')
+
+ allow $1 mmcc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mmcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mmcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_client_packet_t;
+ ')
+
+ dontaudit $1 mmcc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mmcc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mmcc_client_packets'($*)) dnl
+
+ corenet_send_mmcc_client_packets($1)
+ corenet_receive_mmcc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mmcc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mmcc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mmcc_client_packets($1)
+ corenet_dontaudit_receive_mmcc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mmcc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mmcc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mmcc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mmcc_client_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_client_packet_t;
+ ')
+
+ allow $1 mmcc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mmcc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mmcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mmcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_server_packet_t;
+ ')
+
+ allow $1 mmcc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mmcc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mmcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_server_packet_t;
+ ')
+
+ dontaudit $1 mmcc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mmcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mmcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_server_packet_t;
+ ')
+
+ allow $1 mmcc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mmcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mmcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_server_packet_t;
+ ')
+
+ dontaudit $1 mmcc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mmcc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mmcc_server_packets'($*)) dnl
+
+ corenet_send_mmcc_server_packets($1)
+ corenet_receive_mmcc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mmcc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mmcc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mmcc_server_packets($1)
+ corenet_dontaudit_receive_mmcc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mmcc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mmcc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mmcc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mmcc_server_packets'($*)) dnl
+
+ gen_require(`
+ type mmcc_server_packet_t;
+ ')
+
+ allow $1 mmcc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mmcc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mon port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mon_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mon_port'($*)) dnl
+
+ gen_require(`
+ type mon_port_t;
+ ')
+
+ allow $1 mon_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mon_port'($*)) dnl
+
+ gen_require(`
+ type mon_port_t;
+ ')
+
+ allow $1 mon_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mon_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mon port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mon_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mon_port'($*)) dnl
+
+ gen_require(`
+ type mon_port_t;
+ ')
+
+ allow $1 mon_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mon_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mon_client_packets'($*)) dnl
+
+ gen_require(`
+ type mon_client_packet_t;
+ ')
+
+ allow $1 mon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mon_client_packets'($*)) dnl
+
+ gen_require(`
+ type mon_client_packet_t;
+ ')
+
+ dontaudit $1 mon_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mon_client_packets'($*)) dnl
+
+ gen_require(`
+ type mon_client_packet_t;
+ ')
+
+ allow $1 mon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mon_client_packets'($*)) dnl
+
+ gen_require(`
+ type mon_client_packet_t;
+ ')
+
+ dontaudit $1 mon_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mon_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mon_client_packets'($*)) dnl
+
+ corenet_send_mon_client_packets($1)
+ corenet_receive_mon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mon_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mon_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mon_client_packets($1)
+ corenet_dontaudit_receive_mon_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mon_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mon_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mon_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mon_client_packets'($*)) dnl
+
+ gen_require(`
+ type mon_client_packet_t;
+ ')
+
+ allow $1 mon_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mon_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mon_server_packets'($*)) dnl
+
+ gen_require(`
+ type mon_server_packet_t;
+ ')
+
+ allow $1 mon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mon_server_packets'($*)) dnl
+
+ gen_require(`
+ type mon_server_packet_t;
+ ')
+
+ dontaudit $1 mon_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mon_server_packets'($*)) dnl
+
+ gen_require(`
+ type mon_server_packet_t;
+ ')
+
+ allow $1 mon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mon_server_packets'($*)) dnl
+
+ gen_require(`
+ type mon_server_packet_t;
+ ')
+
+ dontaudit $1 mon_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mon_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mon_server_packets'($*)) dnl
+
+ corenet_send_mon_server_packets($1)
+ corenet_receive_mon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mon_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mon_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mon_server_packets($1)
+ corenet_dontaudit_receive_mon_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mon_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mon_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mon_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mon_server_packets'($*)) dnl
+
+ gen_require(`
+ type mon_server_packet_t;
+ ')
+
+ allow $1 mon_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mon_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the monit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the monit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the monit port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_monit_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_monit_port'($*)) dnl
+
+ gen_require(`
+ type monit_port_t;
+ ')
+
+ allow $1 monit_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_monit_port'($*)) dnl
+
+ gen_require(`
+ type monit_port_t;
+ ')
+
+ allow $1 monit_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_monit_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the monit port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_monit_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_monit_port'($*)) dnl
+
+ gen_require(`
+ type monit_port_t;
+ ')
+
+ allow $1 monit_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_monit_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send monit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_monit_client_packets'($*)) dnl
+
+ gen_require(`
+ type monit_client_packet_t;
+ ')
+
+ allow $1 monit_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send monit_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monit_client_packets'($*)) dnl
+
+ gen_require(`
+ type monit_client_packet_t;
+ ')
+
+ dontaudit $1 monit_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive monit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_monit_client_packets'($*)) dnl
+
+ gen_require(`
+ type monit_client_packet_t;
+ ')
+
+ allow $1 monit_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive monit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monit_client_packets'($*)) dnl
+
+ gen_require(`
+ type monit_client_packet_t;
+ ')
+
+ dontaudit $1 monit_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive monit_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monit_client_packets'($*)) dnl
+
+ corenet_send_monit_client_packets($1)
+ corenet_receive_monit_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive monit_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monit_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_monit_client_packets($1)
+ corenet_dontaudit_receive_monit_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monit_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to monit_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_monit_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monit_client_packets'($*)) dnl
+
+ gen_require(`
+ type monit_client_packet_t;
+ ')
+
+ allow $1 monit_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_monit_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send monit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_monit_server_packets'($*)) dnl
+
+ gen_require(`
+ type monit_server_packet_t;
+ ')
+
+ allow $1 monit_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send monit_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monit_server_packets'($*)) dnl
+
+ gen_require(`
+ type monit_server_packet_t;
+ ')
+
+ dontaudit $1 monit_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive monit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_monit_server_packets'($*)) dnl
+
+ gen_require(`
+ type monit_server_packet_t;
+ ')
+
+ allow $1 monit_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive monit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monit_server_packets'($*)) dnl
+
+ gen_require(`
+ type monit_server_packet_t;
+ ')
+
+ dontaudit $1 monit_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive monit_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monit_server_packets'($*)) dnl
+
+ corenet_send_monit_server_packets($1)
+ corenet_receive_monit_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive monit_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monit_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_monit_server_packets($1)
+ corenet_dontaudit_receive_monit_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monit_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to monit_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_monit_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monit_server_packets'($*)) dnl
+
+ gen_require(`
+ type monit_server_packet_t;
+ ')
+
+ allow $1 monit_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_monit_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the monopd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the monopd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the monopd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_monopd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_monopd_port'($*)) dnl
+
+ gen_require(`
+ type monopd_port_t;
+ ')
+
+ allow $1 monopd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_monopd_port'($*)) dnl
+
+ gen_require(`
+ type monopd_port_t;
+ ')
+
+ allow $1 monopd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_monopd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the monopd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_monopd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_monopd_port'($*)) dnl
+
+ gen_require(`
+ type monopd_port_t;
+ ')
+
+ allow $1 monopd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_monopd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send monopd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_monopd_client_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_client_packet_t;
+ ')
+
+ allow $1 monopd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send monopd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monopd_client_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_client_packet_t;
+ ')
+
+ dontaudit $1 monopd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive monopd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_monopd_client_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_client_packet_t;
+ ')
+
+ allow $1 monopd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive monopd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monopd_client_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_client_packet_t;
+ ')
+
+ dontaudit $1 monopd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive monopd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monopd_client_packets'($*)) dnl
+
+ corenet_send_monopd_client_packets($1)
+ corenet_receive_monopd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive monopd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monopd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_monopd_client_packets($1)
+ corenet_dontaudit_receive_monopd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monopd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to monopd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_monopd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monopd_client_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_client_packet_t;
+ ')
+
+ allow $1 monopd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_monopd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send monopd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_monopd_server_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_server_packet_t;
+ ')
+
+ allow $1 monopd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send monopd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_monopd_server_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_server_packet_t;
+ ')
+
+ dontaudit $1 monopd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive monopd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_monopd_server_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_server_packet_t;
+ ')
+
+ allow $1 monopd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive monopd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_monopd_server_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_server_packet_t;
+ ')
+
+ dontaudit $1 monopd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive monopd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_monopd_server_packets'($*)) dnl
+
+ corenet_send_monopd_server_packets($1)
+ corenet_receive_monopd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive monopd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_monopd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_monopd_server_packets($1)
+ corenet_dontaudit_receive_monopd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_monopd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to monopd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_monopd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_monopd_server_packets'($*)) dnl
+
+ gen_require(`
+ type monopd_server_packet_t;
+ ')
+
+ allow $1 monopd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_monopd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mountd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mountd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mountd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mountd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mountd_port'($*)) dnl
+
+ gen_require(`
+ type mountd_port_t;
+ ')
+
+ allow $1 mountd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mountd_port'($*)) dnl
+
+ gen_require(`
+ type mountd_port_t;
+ ')
+
+ allow $1 mountd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mountd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mountd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mountd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mountd_port'($*)) dnl
+
+ gen_require(`
+ type mountd_port_t;
+ ')
+
+ allow $1 mountd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mountd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mountd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mountd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_client_packet_t;
+ ')
+
+ allow $1 mountd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mountd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mountd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_client_packet_t;
+ ')
+
+ dontaudit $1 mountd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mountd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mountd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_client_packet_t;
+ ')
+
+ allow $1 mountd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mountd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mountd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_client_packet_t;
+ ')
+
+ dontaudit $1 mountd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mountd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mountd_client_packets'($*)) dnl
+
+ corenet_send_mountd_client_packets($1)
+ corenet_receive_mountd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mountd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mountd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mountd_client_packets($1)
+ corenet_dontaudit_receive_mountd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mountd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mountd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mountd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mountd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_client_packet_t;
+ ')
+
+ allow $1 mountd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mountd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mountd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mountd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_server_packet_t;
+ ')
+
+ allow $1 mountd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mountd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mountd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_server_packet_t;
+ ')
+
+ dontaudit $1 mountd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mountd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mountd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_server_packet_t;
+ ')
+
+ allow $1 mountd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mountd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mountd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_server_packet_t;
+ ')
+
+ dontaudit $1 mountd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mountd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mountd_server_packets'($*)) dnl
+
+ corenet_send_mountd_server_packets($1)
+ corenet_receive_mountd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mountd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mountd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mountd_server_packets($1)
+ corenet_dontaudit_receive_mountd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mountd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mountd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mountd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mountd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mountd_server_packet_t;
+ ')
+
+ allow $1 mountd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mountd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the movaz_ssc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_movaz_ssc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_movaz_ssc_port'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_port_t;
+ ')
+
+ allow $1 movaz_ssc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_movaz_ssc_port'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_port_t;
+ ')
+
+ allow $1 movaz_ssc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_movaz_ssc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the movaz_ssc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_movaz_ssc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_movaz_ssc_port'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_port_t;
+ ')
+
+ allow $1 movaz_ssc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_movaz_ssc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send movaz_ssc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_movaz_ssc_client_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_client_packet_t;
+ ')
+
+ allow $1 movaz_ssc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send movaz_ssc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_movaz_ssc_client_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_client_packet_t;
+ ')
+
+ dontaudit $1 movaz_ssc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive movaz_ssc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_movaz_ssc_client_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_client_packet_t;
+ ')
+
+ allow $1 movaz_ssc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive movaz_ssc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_movaz_ssc_client_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_client_packet_t;
+ ')
+
+ dontaudit $1 movaz_ssc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive movaz_ssc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_movaz_ssc_client_packets'($*)) dnl
+
+ corenet_send_movaz_ssc_client_packets($1)
+ corenet_receive_movaz_ssc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive movaz_ssc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_movaz_ssc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_movaz_ssc_client_packets($1)
+ corenet_dontaudit_receive_movaz_ssc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to movaz_ssc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_movaz_ssc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_movaz_ssc_client_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_client_packet_t;
+ ')
+
+ allow $1 movaz_ssc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_movaz_ssc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send movaz_ssc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_movaz_ssc_server_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_server_packet_t;
+ ')
+
+ allow $1 movaz_ssc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send movaz_ssc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_movaz_ssc_server_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_server_packet_t;
+ ')
+
+ dontaudit $1 movaz_ssc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive movaz_ssc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_movaz_ssc_server_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_server_packet_t;
+ ')
+
+ allow $1 movaz_ssc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive movaz_ssc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_movaz_ssc_server_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_server_packet_t;
+ ')
+
+ dontaudit $1 movaz_ssc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive movaz_ssc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_movaz_ssc_server_packets'($*)) dnl
+
+ corenet_send_movaz_ssc_server_packets($1)
+ corenet_receive_movaz_ssc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive movaz_ssc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_movaz_ssc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_movaz_ssc_server_packets($1)
+ corenet_dontaudit_receive_movaz_ssc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to movaz_ssc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_movaz_ssc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_movaz_ssc_server_packets'($*)) dnl
+
+ gen_require(`
+ type movaz_ssc_server_packet_t;
+ ')
+
+ allow $1 movaz_ssc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_movaz_ssc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mpd_port'($*)) dnl
+
+ gen_require(`
+ type mpd_port_t;
+ ')
+
+ allow $1 mpd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mpd_port'($*)) dnl
+
+ gen_require(`
+ type mpd_port_t;
+ ')
+
+ allow $1 mpd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mpd_port'($*)) dnl
+
+ gen_require(`
+ type mpd_port_t;
+ ')
+
+ allow $1 mpd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mpd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_client_packet_t;
+ ')
+
+ allow $1 mpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_client_packet_t;
+ ')
+
+ dontaudit $1 mpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_client_packet_t;
+ ')
+
+ allow $1 mpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_client_packet_t;
+ ')
+
+ dontaudit $1 mpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mpd_client_packets'($*)) dnl
+
+ corenet_send_mpd_client_packets($1)
+ corenet_receive_mpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mpd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mpd_client_packets($1)
+ corenet_dontaudit_receive_mpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mpd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_client_packet_t;
+ ')
+
+ allow $1 mpd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mpd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_server_packet_t;
+ ')
+
+ allow $1 mpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_server_packet_t;
+ ')
+
+ dontaudit $1 mpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_server_packet_t;
+ ')
+
+ allow $1 mpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_server_packet_t;
+ ')
+
+ dontaudit $1 mpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mpd_server_packets'($*)) dnl
+
+ corenet_send_mpd_server_packets($1)
+ corenet_receive_mpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mpd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mpd_server_packets($1)
+ corenet_dontaudit_receive_mpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mpd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mpd_server_packet_t;
+ ')
+
+ allow $1 mpd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mpd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the msgsrvr port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_msgsrvr_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_msgsrvr_port'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_port_t;
+ ')
+
+ allow $1 msgsrvr_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_msgsrvr_port'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_port_t;
+ ')
+
+ allow $1 msgsrvr_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_msgsrvr_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the msgsrvr port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_msgsrvr_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_msgsrvr_port'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_port_t;
+ ')
+
+ allow $1 msgsrvr_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_msgsrvr_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send msgsrvr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_msgsrvr_client_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_client_packet_t;
+ ')
+
+ allow $1 msgsrvr_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send msgsrvr_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msgsrvr_client_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_client_packet_t;
+ ')
+
+ dontaudit $1 msgsrvr_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive msgsrvr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_msgsrvr_client_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_client_packet_t;
+ ')
+
+ allow $1 msgsrvr_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive msgsrvr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msgsrvr_client_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_client_packet_t;
+ ')
+
+ dontaudit $1 msgsrvr_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive msgsrvr_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msgsrvr_client_packets'($*)) dnl
+
+ corenet_send_msgsrvr_client_packets($1)
+ corenet_receive_msgsrvr_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive msgsrvr_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msgsrvr_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_msgsrvr_client_packets($1)
+ corenet_dontaudit_receive_msgsrvr_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to msgsrvr_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_msgsrvr_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msgsrvr_client_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_client_packet_t;
+ ')
+
+ allow $1 msgsrvr_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_msgsrvr_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send msgsrvr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_msgsrvr_server_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_server_packet_t;
+ ')
+
+ allow $1 msgsrvr_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send msgsrvr_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msgsrvr_server_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_server_packet_t;
+ ')
+
+ dontaudit $1 msgsrvr_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive msgsrvr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_msgsrvr_server_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_server_packet_t;
+ ')
+
+ allow $1 msgsrvr_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive msgsrvr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msgsrvr_server_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_server_packet_t;
+ ')
+
+ dontaudit $1 msgsrvr_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive msgsrvr_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msgsrvr_server_packets'($*)) dnl
+
+ corenet_send_msgsrvr_server_packets($1)
+ corenet_receive_msgsrvr_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive msgsrvr_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msgsrvr_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_msgsrvr_server_packets($1)
+ corenet_dontaudit_receive_msgsrvr_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to msgsrvr_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_msgsrvr_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msgsrvr_server_packets'($*)) dnl
+
+ gen_require(`
+ type msgsrvr_server_packet_t;
+ ')
+
+ allow $1 msgsrvr_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_msgsrvr_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the msnp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the msnp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the msnp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_msnp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_msnp_port'($*)) dnl
+
+ gen_require(`
+ type msnp_port_t;
+ ')
+
+ allow $1 msnp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_msnp_port'($*)) dnl
+
+ gen_require(`
+ type msnp_port_t;
+ ')
+
+ allow $1 msnp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_msnp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the msnp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_msnp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_msnp_port'($*)) dnl
+
+ gen_require(`
+ type msnp_port_t;
+ ')
+
+ allow $1 msnp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_msnp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send msnp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_msnp_client_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_client_packet_t;
+ ')
+
+ allow $1 msnp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send msnp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msnp_client_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_client_packet_t;
+ ')
+
+ dontaudit $1 msnp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive msnp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_msnp_client_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_client_packet_t;
+ ')
+
+ allow $1 msnp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive msnp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msnp_client_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_client_packet_t;
+ ')
+
+ dontaudit $1 msnp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive msnp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msnp_client_packets'($*)) dnl
+
+ corenet_send_msnp_client_packets($1)
+ corenet_receive_msnp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive msnp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msnp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_msnp_client_packets($1)
+ corenet_dontaudit_receive_msnp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msnp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to msnp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_msnp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msnp_client_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_client_packet_t;
+ ')
+
+ allow $1 msnp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_msnp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send msnp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_msnp_server_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_server_packet_t;
+ ')
+
+ allow $1 msnp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send msnp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_msnp_server_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_server_packet_t;
+ ')
+
+ dontaudit $1 msnp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive msnp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_msnp_server_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_server_packet_t;
+ ')
+
+ allow $1 msnp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive msnp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_msnp_server_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_server_packet_t;
+ ')
+
+ dontaudit $1 msnp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive msnp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_msnp_server_packets'($*)) dnl
+
+ corenet_send_msnp_server_packets($1)
+ corenet_receive_msnp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive msnp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_msnp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_msnp_server_packets($1)
+ corenet_dontaudit_receive_msnp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_msnp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to msnp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_msnp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_msnp_server_packets'($*)) dnl
+
+ gen_require(`
+ type msnp_server_packet_t;
+ ')
+
+ allow $1 msnp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_msnp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mssql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mssql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mssql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mssql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mssql_port'($*)) dnl
+
+ gen_require(`
+ type mssql_port_t;
+ ')
+
+ allow $1 mssql_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mssql_port'($*)) dnl
+
+ gen_require(`
+ type mssql_port_t;
+ ')
+
+ allow $1 mssql_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mssql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mssql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mssql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mssql_port'($*)) dnl
+
+ gen_require(`
+ type mssql_port_t;
+ ')
+
+ allow $1 mssql_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mssql_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mssql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mssql_client_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_client_packet_t;
+ ')
+
+ allow $1 mssql_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mssql_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mssql_client_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_client_packet_t;
+ ')
+
+ dontaudit $1 mssql_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mssql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mssql_client_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_client_packet_t;
+ ')
+
+ allow $1 mssql_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mssql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mssql_client_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_client_packet_t;
+ ')
+
+ dontaudit $1 mssql_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mssql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mssql_client_packets'($*)) dnl
+
+ corenet_send_mssql_client_packets($1)
+ corenet_receive_mssql_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mssql_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mssql_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mssql_client_packets($1)
+ corenet_dontaudit_receive_mssql_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mssql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mssql_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mssql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mssql_client_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_client_packet_t;
+ ')
+
+ allow $1 mssql_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mssql_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mssql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mssql_server_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_server_packet_t;
+ ')
+
+ allow $1 mssql_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mssql_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mssql_server_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_server_packet_t;
+ ')
+
+ dontaudit $1 mssql_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mssql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mssql_server_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_server_packet_t;
+ ')
+
+ allow $1 mssql_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mssql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mssql_server_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_server_packet_t;
+ ')
+
+ dontaudit $1 mssql_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mssql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mssql_server_packets'($*)) dnl
+
+ corenet_send_mssql_server_packets($1)
+ corenet_receive_mssql_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mssql_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mssql_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mssql_server_packets($1)
+ corenet_dontaudit_receive_mssql_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mssql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mssql_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mssql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mssql_server_packets'($*)) dnl
+
+ gen_require(`
+ type mssql_server_packet_t;
+ ')
+
+ allow $1 mssql_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mssql_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ms_streaming port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ms_streaming_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ms_streaming_port'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_port_t;
+ ')
+
+ allow $1 ms_streaming_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ms_streaming_port'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_port_t;
+ ')
+
+ allow $1 ms_streaming_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ms_streaming_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ms_streaming port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ms_streaming_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ms_streaming_port'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_port_t;
+ ')
+
+ allow $1 ms_streaming_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ms_streaming_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ms_streaming_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ms_streaming_client_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_client_packet_t;
+ ')
+
+ allow $1 ms_streaming_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ms_streaming_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ms_streaming_client_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_client_packet_t;
+ ')
+
+ dontaudit $1 ms_streaming_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ms_streaming_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ms_streaming_client_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_client_packet_t;
+ ')
+
+ allow $1 ms_streaming_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ms_streaming_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ms_streaming_client_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_client_packet_t;
+ ')
+
+ dontaudit $1 ms_streaming_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ms_streaming_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ms_streaming_client_packets'($*)) dnl
+
+ corenet_send_ms_streaming_client_packets($1)
+ corenet_receive_ms_streaming_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ms_streaming_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ms_streaming_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ms_streaming_client_packets($1)
+ corenet_dontaudit_receive_ms_streaming_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ms_streaming_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ms_streaming_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ms_streaming_client_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_client_packet_t;
+ ')
+
+ allow $1 ms_streaming_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ms_streaming_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ms_streaming_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ms_streaming_server_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_server_packet_t;
+ ')
+
+ allow $1 ms_streaming_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ms_streaming_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ms_streaming_server_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_server_packet_t;
+ ')
+
+ dontaudit $1 ms_streaming_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ms_streaming_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ms_streaming_server_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_server_packet_t;
+ ')
+
+ allow $1 ms_streaming_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ms_streaming_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ms_streaming_server_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_server_packet_t;
+ ')
+
+ dontaudit $1 ms_streaming_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ms_streaming_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ms_streaming_server_packets'($*)) dnl
+
+ corenet_send_ms_streaming_server_packets($1)
+ corenet_receive_ms_streaming_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ms_streaming_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ms_streaming_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ms_streaming_server_packets($1)
+ corenet_dontaudit_receive_ms_streaming_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ms_streaming_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ms_streaming_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ms_streaming_server_packets'($*)) dnl
+
+ gen_require(`
+ type ms_streaming_server_packet_t;
+ ')
+
+ allow $1 ms_streaming_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ms_streaming_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the munin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the munin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the munin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_munin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_munin_port'($*)) dnl
+
+ gen_require(`
+ type munin_port_t;
+ ')
+
+ allow $1 munin_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_munin_port'($*)) dnl
+
+ gen_require(`
+ type munin_port_t;
+ ')
+
+ allow $1 munin_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_munin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the munin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_munin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_munin_port'($*)) dnl
+
+ gen_require(`
+ type munin_port_t;
+ ')
+
+ allow $1 munin_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_munin_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send munin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_munin_client_packets'($*)) dnl
+
+ gen_require(`
+ type munin_client_packet_t;
+ ')
+
+ allow $1 munin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send munin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_munin_client_packets'($*)) dnl
+
+ gen_require(`
+ type munin_client_packet_t;
+ ')
+
+ dontaudit $1 munin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive munin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_munin_client_packets'($*)) dnl
+
+ gen_require(`
+ type munin_client_packet_t;
+ ')
+
+ allow $1 munin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive munin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_munin_client_packets'($*)) dnl
+
+ gen_require(`
+ type munin_client_packet_t;
+ ')
+
+ dontaudit $1 munin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive munin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_munin_client_packets'($*)) dnl
+
+ corenet_send_munin_client_packets($1)
+ corenet_receive_munin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive munin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_munin_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_munin_client_packets($1)
+ corenet_dontaudit_receive_munin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_munin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to munin_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_munin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_munin_client_packets'($*)) dnl
+
+ gen_require(`
+ type munin_client_packet_t;
+ ')
+
+ allow $1 munin_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_munin_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send munin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_munin_server_packets'($*)) dnl
+
+ gen_require(`
+ type munin_server_packet_t;
+ ')
+
+ allow $1 munin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send munin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_munin_server_packets'($*)) dnl
+
+ gen_require(`
+ type munin_server_packet_t;
+ ')
+
+ dontaudit $1 munin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive munin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_munin_server_packets'($*)) dnl
+
+ gen_require(`
+ type munin_server_packet_t;
+ ')
+
+ allow $1 munin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive munin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_munin_server_packets'($*)) dnl
+
+ gen_require(`
+ type munin_server_packet_t;
+ ')
+
+ dontaudit $1 munin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive munin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_munin_server_packets'($*)) dnl
+
+ corenet_send_munin_server_packets($1)
+ corenet_receive_munin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive munin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_munin_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_munin_server_packets($1)
+ corenet_dontaudit_receive_munin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_munin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to munin_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_munin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_munin_server_packets'($*)) dnl
+
+ gen_require(`
+ type munin_server_packet_t;
+ ')
+
+ allow $1 munin_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_munin_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mxi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mxi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mxi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mxi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mxi_port'($*)) dnl
+
+ gen_require(`
+ type mxi_port_t;
+ ')
+
+ allow $1 mxi_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mxi_port'($*)) dnl
+
+ gen_require(`
+ type mxi_port_t;
+ ')
+
+ allow $1 mxi_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mxi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mxi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mxi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mxi_port'($*)) dnl
+
+ gen_require(`
+ type mxi_port_t;
+ ')
+
+ allow $1 mxi_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mxi_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mxi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mxi_client_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_client_packet_t;
+ ')
+
+ allow $1 mxi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mxi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mxi_client_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_client_packet_t;
+ ')
+
+ dontaudit $1 mxi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mxi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mxi_client_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_client_packet_t;
+ ')
+
+ allow $1 mxi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mxi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mxi_client_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_client_packet_t;
+ ')
+
+ dontaudit $1 mxi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mxi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mxi_client_packets'($*)) dnl
+
+ corenet_send_mxi_client_packets($1)
+ corenet_receive_mxi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mxi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mxi_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mxi_client_packets($1)
+ corenet_dontaudit_receive_mxi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mxi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mxi_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mxi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mxi_client_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_client_packet_t;
+ ')
+
+ allow $1 mxi_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mxi_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mxi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mxi_server_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_server_packet_t;
+ ')
+
+ allow $1 mxi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mxi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mxi_server_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_server_packet_t;
+ ')
+
+ dontaudit $1 mxi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mxi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mxi_server_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_server_packet_t;
+ ')
+
+ allow $1 mxi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mxi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mxi_server_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_server_packet_t;
+ ')
+
+ dontaudit $1 mxi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mxi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mxi_server_packets'($*)) dnl
+
+ corenet_send_mxi_server_packets($1)
+ corenet_receive_mxi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mxi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mxi_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mxi_server_packets($1)
+ corenet_dontaudit_receive_mxi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mxi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mxi_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mxi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mxi_server_packets'($*)) dnl
+
+ gen_require(`
+ type mxi_server_packet_t;
+ ')
+
+ allow $1 mxi_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mxi_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mysqld port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mysqld port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mysqld port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mysqld_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mysqld_port'($*)) dnl
+
+ gen_require(`
+ type mysqld_port_t;
+ ')
+
+ allow $1 mysqld_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mysqld_port'($*)) dnl
+
+ gen_require(`
+ type mysqld_port_t;
+ ')
+
+ allow $1 mysqld_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mysqld_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mysqld port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mysqld_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mysqld_port'($*)) dnl
+
+ gen_require(`
+ type mysqld_port_t;
+ ')
+
+ allow $1 mysqld_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mysqld_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mysqld_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mysqld_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_client_packet_t;
+ ')
+
+ allow $1 mysqld_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mysqld_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqld_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_client_packet_t;
+ ')
+
+ dontaudit $1 mysqld_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mysqld_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqld_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_client_packet_t;
+ ')
+
+ allow $1 mysqld_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mysqld_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqld_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_client_packet_t;
+ ')
+
+ dontaudit $1 mysqld_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mysqld_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqld_client_packets'($*)) dnl
+
+ corenet_send_mysqld_client_packets($1)
+ corenet_receive_mysqld_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mysqld_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqld_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mysqld_client_packets($1)
+ corenet_dontaudit_receive_mysqld_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqld_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mysqld_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mysqld_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqld_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_client_packet_t;
+ ')
+
+ allow $1 mysqld_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqld_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mysqld_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mysqld_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_server_packet_t;
+ ')
+
+ allow $1 mysqld_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mysqld_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqld_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_server_packet_t;
+ ')
+
+ dontaudit $1 mysqld_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mysqld_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqld_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_server_packet_t;
+ ')
+
+ allow $1 mysqld_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mysqld_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqld_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_server_packet_t;
+ ')
+
+ dontaudit $1 mysqld_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mysqld_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqld_server_packets'($*)) dnl
+
+ corenet_send_mysqld_server_packets($1)
+ corenet_receive_mysqld_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mysqld_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqld_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mysqld_server_packets($1)
+ corenet_dontaudit_receive_mysqld_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqld_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mysqld_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mysqld_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqld_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqld_server_packet_t;
+ ')
+
+ allow $1 mysqld_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqld_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the mysqlmanagerd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_mysqlmanagerd_port'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_port_t;
+ ')
+
+ allow $1 mysqlmanagerd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_mysqlmanagerd_port'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_port_t;
+ ')
+
+ allow $1 mysqlmanagerd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the mysqlmanagerd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_mysqlmanagerd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_mysqlmanagerd_port'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_port_t;
+ ')
+
+ allow $1 mysqlmanagerd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_mysqlmanagerd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mysqlmanagerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mysqlmanagerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_client_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mysqlmanagerd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqlmanagerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_client_packet_t;
+ ')
+
+ dontaudit $1 mysqlmanagerd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mysqlmanagerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqlmanagerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_client_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mysqlmanagerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqlmanagerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_client_packet_t;
+ ')
+
+ dontaudit $1 mysqlmanagerd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mysqlmanagerd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
+
+ corenet_send_mysqlmanagerd_client_packets($1)
+ corenet_receive_mysqlmanagerd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mysqlmanagerd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_mysqlmanagerd_client_packets($1)
+ corenet_dontaudit_receive_mysqlmanagerd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mysqlmanagerd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mysqlmanagerd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqlmanagerd_client_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_client_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqlmanagerd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send mysqlmanagerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_mysqlmanagerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_server_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send mysqlmanagerd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_mysqlmanagerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_server_packet_t;
+ ')
+
+ dontaudit $1 mysqlmanagerd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive mysqlmanagerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_mysqlmanagerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_server_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive mysqlmanagerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_mysqlmanagerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_server_packet_t;
+ ')
+
+ dontaudit $1 mysqlmanagerd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive mysqlmanagerd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
+
+ corenet_send_mysqlmanagerd_server_packets($1)
+ corenet_receive_mysqlmanagerd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive mysqlmanagerd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_mysqlmanagerd_server_packets($1)
+ corenet_dontaudit_receive_mysqlmanagerd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to mysqlmanagerd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_mysqlmanagerd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_mysqlmanagerd_server_packets'($*)) dnl
+
+ gen_require(`
+ type mysqlmanagerd_server_packet_t;
+ ')
+
+ allow $1 mysqlmanagerd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_mysqlmanagerd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the nessus port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the nessus port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the nessus port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nessus_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nessus_port'($*)) dnl
+
+ gen_require(`
+ type nessus_port_t;
+ ')
+
+ allow $1 nessus_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nessus_port'($*)) dnl
+
+ gen_require(`
+ type nessus_port_t;
+ ')
+
+ allow $1 nessus_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nessus_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the nessus port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_nessus_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nessus_port'($*)) dnl
+
+ gen_require(`
+ type nessus_port_t;
+ ')
+
+ allow $1 nessus_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nessus_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nessus_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nessus_client_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_client_packet_t;
+ ')
+
+ allow $1 nessus_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nessus_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nessus_client_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_client_packet_t;
+ ')
+
+ dontaudit $1 nessus_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nessus_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nessus_client_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_client_packet_t;
+ ')
+
+ allow $1 nessus_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nessus_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nessus_client_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_client_packet_t;
+ ')
+
+ dontaudit $1 nessus_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nessus_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nessus_client_packets'($*)) dnl
+
+ corenet_send_nessus_client_packets($1)
+ corenet_receive_nessus_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nessus_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nessus_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_nessus_client_packets($1)
+ corenet_dontaudit_receive_nessus_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nessus_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nessus_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nessus_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nessus_client_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_client_packet_t;
+ ')
+
+ allow $1 nessus_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nessus_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nessus_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nessus_server_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_server_packet_t;
+ ')
+
+ allow $1 nessus_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nessus_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nessus_server_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_server_packet_t;
+ ')
+
+ dontaudit $1 nessus_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nessus_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nessus_server_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_server_packet_t;
+ ')
+
+ allow $1 nessus_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nessus_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nessus_server_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_server_packet_t;
+ ')
+
+ dontaudit $1 nessus_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nessus_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nessus_server_packets'($*)) dnl
+
+ corenet_send_nessus_server_packets($1)
+ corenet_receive_nessus_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nessus_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nessus_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_nessus_server_packets($1)
+ corenet_dontaudit_receive_nessus_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nessus_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nessus_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nessus_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nessus_server_packets'($*)) dnl
+
+ gen_require(`
+ type nessus_server_packet_t;
+ ')
+
+ allow $1 nessus_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nessus_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the netport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the netport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the netport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_netport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_netport_port'($*)) dnl
+
+ gen_require(`
+ type netport_port_t;
+ ')
+
+ allow $1 netport_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_netport_port'($*)) dnl
+
+ gen_require(`
+ type netport_port_t;
+ ')
+
+ allow $1 netport_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_netport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the netport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_netport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_netport_port'($*)) dnl
+
+ gen_require(`
+ type netport_port_t;
+ ')
+
+ allow $1 netport_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_netport_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send netport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_netport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netport_client_packet_t;
+ ')
+
+ allow $1 netport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send netport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netport_client_packet_t;
+ ')
+
+ dontaudit $1 netport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive netport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_netport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netport_client_packet_t;
+ ')
+
+ allow $1 netport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive netport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netport_client_packet_t;
+ ')
+
+ dontaudit $1 netport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive netport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netport_client_packets'($*)) dnl
+
+ corenet_send_netport_client_packets($1)
+ corenet_receive_netport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive netport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netport_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_netport_client_packets($1)
+ corenet_dontaudit_receive_netport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to netport_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_netport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netport_client_packet_t;
+ ')
+
+ allow $1 netport_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_netport_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send netport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_netport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netport_server_packet_t;
+ ')
+
+ allow $1 netport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send netport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netport_server_packet_t;
+ ')
+
+ dontaudit $1 netport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive netport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_netport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netport_server_packet_t;
+ ')
+
+ allow $1 netport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive netport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netport_server_packet_t;
+ ')
+
+ dontaudit $1 netport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive netport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netport_server_packets'($*)) dnl
+
+ corenet_send_netport_server_packets($1)
+ corenet_receive_netport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive netport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netport_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_netport_server_packets($1)
+ corenet_dontaudit_receive_netport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to netport_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_netport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netport_server_packet_t;
+ ')
+
+ allow $1 netport_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_netport_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the netsupport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the netsupport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the netsupport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_netsupport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_netsupport_port'($*)) dnl
+
+ gen_require(`
+ type netsupport_port_t;
+ ')
+
+ allow $1 netsupport_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_netsupport_port'($*)) dnl
+
+ gen_require(`
+ type netsupport_port_t;
+ ')
+
+ allow $1 netsupport_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_netsupport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the netsupport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_netsupport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_netsupport_port'($*)) dnl
+
+ gen_require(`
+ type netsupport_port_t;
+ ')
+
+ allow $1 netsupport_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_netsupport_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send netsupport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_netsupport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_client_packet_t;
+ ')
+
+ allow $1 netsupport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send netsupport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netsupport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_client_packet_t;
+ ')
+
+ dontaudit $1 netsupport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive netsupport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_netsupport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_client_packet_t;
+ ')
+
+ allow $1 netsupport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive netsupport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netsupport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_client_packet_t;
+ ')
+
+ dontaudit $1 netsupport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive netsupport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netsupport_client_packets'($*)) dnl
+
+ corenet_send_netsupport_client_packets($1)
+ corenet_receive_netsupport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive netsupport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netsupport_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_netsupport_client_packets($1)
+ corenet_dontaudit_receive_netsupport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netsupport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to netsupport_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_netsupport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netsupport_client_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_client_packet_t;
+ ')
+
+ allow $1 netsupport_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_netsupport_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send netsupport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_netsupport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_server_packet_t;
+ ')
+
+ allow $1 netsupport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send netsupport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_netsupport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_server_packet_t;
+ ')
+
+ dontaudit $1 netsupport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive netsupport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_netsupport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_server_packet_t;
+ ')
+
+ allow $1 netsupport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive netsupport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_netsupport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_server_packet_t;
+ ')
+
+ dontaudit $1 netsupport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive netsupport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_netsupport_server_packets'($*)) dnl
+
+ corenet_send_netsupport_server_packets($1)
+ corenet_receive_netsupport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive netsupport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_netsupport_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_netsupport_server_packets($1)
+ corenet_dontaudit_receive_netsupport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_netsupport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to netsupport_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_netsupport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_netsupport_server_packets'($*)) dnl
+
+ gen_require(`
+ type netsupport_server_packet_t;
+ ')
+
+ allow $1 netsupport_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_netsupport_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the nfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the nfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the nfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nfs_port'($*)) dnl
+
+ gen_require(`
+ type nfs_port_t;
+ ')
+
+ allow $1 nfs_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nfs_port'($*)) dnl
+
+ gen_require(`
+ type nfs_port_t;
+ ')
+
+ allow $1 nfs_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the nfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_nfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nfs_port'($*)) dnl
+
+ gen_require(`
+ type nfs_port_t;
+ ')
+
+ allow $1 nfs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nfs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_client_packet_t;
+ ')
+
+ allow $1 nfs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nfs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_client_packet_t;
+ ')
+
+ dontaudit $1 nfs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_client_packet_t;
+ ')
+
+ allow $1 nfs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_client_packet_t;
+ ')
+
+ dontaudit $1 nfs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfs_client_packets'($*)) dnl
+
+ corenet_send_nfs_client_packets($1)
+ corenet_receive_nfs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nfs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_nfs_client_packets($1)
+ corenet_dontaudit_receive_nfs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nfs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_client_packet_t;
+ ')
+
+ allow $1 nfs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_server_packet_t;
+ ')
+
+ allow $1 nfs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nfs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_server_packet_t;
+ ')
+
+ dontaudit $1 nfs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_server_packet_t;
+ ')
+
+ allow $1 nfs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_server_packet_t;
+ ')
+
+ dontaudit $1 nfs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfs_server_packets'($*)) dnl
+
+ corenet_send_nfs_server_packets($1)
+ corenet_receive_nfs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nfs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_nfs_server_packets($1)
+ corenet_dontaudit_receive_nfs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nfs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfs_server_packet_t;
+ ')
+
+ allow $1 nfs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the nfsrdma port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nfsrdma_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nfsrdma_port'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_port_t;
+ ')
+
+ allow $1 nfsrdma_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nfsrdma_port'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_port_t;
+ ')
+
+ allow $1 nfsrdma_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nfsrdma_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the nfsrdma port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_nfsrdma_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nfsrdma_port'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_port_t;
+ ')
+
+ allow $1 nfsrdma_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nfsrdma_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nfsrdma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nfsrdma_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_client_packet_t;
+ ')
+
+ allow $1 nfsrdma_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nfsrdma_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfsrdma_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_client_packet_t;
+ ')
+
+ dontaudit $1 nfsrdma_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nfsrdma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nfsrdma_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_client_packet_t;
+ ')
+
+ allow $1 nfsrdma_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nfsrdma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfsrdma_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_client_packet_t;
+ ')
+
+ dontaudit $1 nfsrdma_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nfsrdma_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfsrdma_client_packets'($*)) dnl
+
+ corenet_send_nfsrdma_client_packets($1)
+ corenet_receive_nfsrdma_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nfsrdma_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfsrdma_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_nfsrdma_client_packets($1)
+ corenet_dontaudit_receive_nfsrdma_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nfsrdma_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nfsrdma_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfsrdma_client_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_client_packet_t;
+ ')
+
+ allow $1 nfsrdma_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfsrdma_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nfsrdma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nfsrdma_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_server_packet_t;
+ ')
+
+ allow $1 nfsrdma_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nfsrdma_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nfsrdma_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_server_packet_t;
+ ')
+
+ dontaudit $1 nfsrdma_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nfsrdma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nfsrdma_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_server_packet_t;
+ ')
+
+ allow $1 nfsrdma_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nfsrdma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nfsrdma_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_server_packet_t;
+ ')
+
+ dontaudit $1 nfsrdma_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nfsrdma_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nfsrdma_server_packets'($*)) dnl
+
+ corenet_send_nfsrdma_server_packets($1)
+ corenet_receive_nfsrdma_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nfsrdma_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nfsrdma_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_nfsrdma_server_packets($1)
+ corenet_dontaudit_receive_nfsrdma_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nfsrdma_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nfsrdma_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nfsrdma_server_packets'($*)) dnl
+
+ gen_require(`
+ type nfsrdma_server_packet_t;
+ ')
+
+ allow $1 nfsrdma_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nfsrdma_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the nmbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the nmbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the nmbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_nmbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_nmbd_port'($*)) dnl
+
+ gen_require(`
+ type nmbd_port_t;
+ ')
+
+ allow $1 nmbd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_nmbd_port'($*)) dnl
+
+ gen_require(`
+ type nmbd_port_t;
+ ')
+
+ allow $1 nmbd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_nmbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the nmbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_nmbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_nmbd_port'($*)) dnl
+
+ gen_require(`
+ type nmbd_port_t;
+ ')
+
+ allow $1 nmbd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_nmbd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nmbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nmbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_client_packet_t;
+ ')
+
+ allow $1 nmbd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nmbd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nmbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_client_packet_t;
+ ')
+
+ dontaudit $1 nmbd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nmbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nmbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_client_packet_t;
+ ')
+
+ allow $1 nmbd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nmbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nmbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_client_packet_t;
+ ')
+
+ dontaudit $1 nmbd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nmbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nmbd_client_packets'($*)) dnl
+
+ corenet_send_nmbd_client_packets($1)
+ corenet_receive_nmbd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nmbd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nmbd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_nmbd_client_packets($1)
+ corenet_dontaudit_receive_nmbd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nmbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nmbd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nmbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nmbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_client_packet_t;
+ ')
+
+ allow $1 nmbd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nmbd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send nmbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_nmbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_server_packet_t;
+ ')
+
+ allow $1 nmbd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send nmbd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_nmbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_server_packet_t;
+ ')
+
+ dontaudit $1 nmbd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive nmbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_nmbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_server_packet_t;
+ ')
+
+ allow $1 nmbd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive nmbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_nmbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_server_packet_t;
+ ')
+
+ dontaudit $1 nmbd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive nmbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_nmbd_server_packets'($*)) dnl
+
+ corenet_send_nmbd_server_packets($1)
+ corenet_receive_nmbd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive nmbd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_nmbd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_nmbd_server_packets($1)
+ corenet_dontaudit_receive_nmbd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_nmbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to nmbd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_nmbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_nmbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type nmbd_server_packet_t;
+ ')
+
+ allow $1 nmbd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_nmbd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ntop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ntop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ntop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ntop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ntop_port'($*)) dnl
+
+ gen_require(`
+ type ntop_port_t;
+ ')
+
+ allow $1 ntop_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ntop_port'($*)) dnl
+
+ gen_require(`
+ type ntop_port_t;
+ ')
+
+ allow $1 ntop_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ntop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ntop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ntop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ntop_port'($*)) dnl
+
+ gen_require(`
+ type ntop_port_t;
+ ')
+
+ allow $1 ntop_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ntop_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ntop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ntop_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_client_packet_t;
+ ')
+
+ allow $1 ntop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ntop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntop_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_client_packet_t;
+ ')
+
+ dontaudit $1 ntop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ntop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ntop_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_client_packet_t;
+ ')
+
+ allow $1 ntop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ntop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntop_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_client_packet_t;
+ ')
+
+ dontaudit $1 ntop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ntop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntop_client_packets'($*)) dnl
+
+ corenet_send_ntop_client_packets($1)
+ corenet_receive_ntop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ntop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntop_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ntop_client_packets($1)
+ corenet_dontaudit_receive_ntop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ntop_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ntop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntop_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_client_packet_t;
+ ')
+
+ allow $1 ntop_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntop_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ntop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ntop_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_server_packet_t;
+ ')
+
+ allow $1 ntop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ntop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntop_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_server_packet_t;
+ ')
+
+ dontaudit $1 ntop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ntop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ntop_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_server_packet_t;
+ ')
+
+ allow $1 ntop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ntop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntop_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_server_packet_t;
+ ')
+
+ dontaudit $1 ntop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ntop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntop_server_packets'($*)) dnl
+
+ corenet_send_ntop_server_packets($1)
+ corenet_receive_ntop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ntop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntop_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ntop_server_packets($1)
+ corenet_dontaudit_receive_ntop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ntop_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ntop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntop_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntop_server_packet_t;
+ ')
+
+ allow $1 ntop_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntop_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ntp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ntp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ntp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ntp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ntp_port'($*)) dnl
+
+ gen_require(`
+ type ntp_port_t;
+ ')
+
+ allow $1 ntp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ntp_port'($*)) dnl
+
+ gen_require(`
+ type ntp_port_t;
+ ')
+
+ allow $1 ntp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ntp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ntp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ntp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ntp_port'($*)) dnl
+
+ gen_require(`
+ type ntp_port_t;
+ ')
+
+ allow $1 ntp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ntp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ntp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ntp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_client_packet_t;
+ ')
+
+ allow $1 ntp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ntp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_client_packet_t;
+ ')
+
+ dontaudit $1 ntp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ntp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ntp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_client_packet_t;
+ ')
+
+ allow $1 ntp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ntp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_client_packet_t;
+ ')
+
+ dontaudit $1 ntp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ntp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntp_client_packets'($*)) dnl
+
+ corenet_send_ntp_client_packets($1)
+ corenet_receive_ntp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ntp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ntp_client_packets($1)
+ corenet_dontaudit_receive_ntp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ntp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ntp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_client_packet_t;
+ ')
+
+ allow $1 ntp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ntp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ntp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_server_packet_t;
+ ')
+
+ allow $1 ntp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ntp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ntp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_server_packet_t;
+ ')
+
+ dontaudit $1 ntp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ntp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ntp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_server_packet_t;
+ ')
+
+ allow $1 ntp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ntp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ntp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_server_packet_t;
+ ')
+
+ dontaudit $1 ntp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ntp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ntp_server_packets'($*)) dnl
+
+ corenet_send_ntp_server_packets($1)
+ corenet_receive_ntp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ntp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ntp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ntp_server_packets($1)
+ corenet_dontaudit_receive_ntp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ntp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ntp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ntp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ntp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ntp_server_packet_t;
+ ')
+
+ allow $1 ntp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ntp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the oa_system port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the oa_system port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the oa_system port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_oa_system_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_oa_system_port'($*)) dnl
+
+ gen_require(`
+ type oa_system_port_t;
+ ')
+
+ allow $1 oa_system_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_oa_system_port'($*)) dnl
+
+ gen_require(`
+ type oa_system_port_t;
+ ')
+
+ allow $1 oa_system_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_oa_system_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the oa_system port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_oa_system_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_oa_system_port'($*)) dnl
+
+ gen_require(`
+ type oa_system_port_t;
+ ')
+
+ allow $1 oa_system_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_oa_system_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send oa_system_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_oa_system_client_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_client_packet_t;
+ ')
+
+ allow $1 oa_system_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send oa_system_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oa_system_client_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_client_packet_t;
+ ')
+
+ dontaudit $1 oa_system_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive oa_system_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_oa_system_client_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_client_packet_t;
+ ')
+
+ allow $1 oa_system_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive oa_system_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oa_system_client_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_client_packet_t;
+ ')
+
+ dontaudit $1 oa_system_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive oa_system_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oa_system_client_packets'($*)) dnl
+
+ corenet_send_oa_system_client_packets($1)
+ corenet_receive_oa_system_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive oa_system_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oa_system_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_oa_system_client_packets($1)
+ corenet_dontaudit_receive_oa_system_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oa_system_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to oa_system_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_oa_system_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oa_system_client_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_client_packet_t;
+ ')
+
+ allow $1 oa_system_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_oa_system_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send oa_system_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_oa_system_server_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_server_packet_t;
+ ')
+
+ allow $1 oa_system_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send oa_system_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oa_system_server_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_server_packet_t;
+ ')
+
+ dontaudit $1 oa_system_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive oa_system_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_oa_system_server_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_server_packet_t;
+ ')
+
+ allow $1 oa_system_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive oa_system_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oa_system_server_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_server_packet_t;
+ ')
+
+ dontaudit $1 oa_system_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive oa_system_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oa_system_server_packets'($*)) dnl
+
+ corenet_send_oa_system_server_packets($1)
+ corenet_receive_oa_system_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive oa_system_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oa_system_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_oa_system_server_packets($1)
+ corenet_dontaudit_receive_oa_system_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oa_system_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to oa_system_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_oa_system_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oa_system_server_packets'($*)) dnl
+
+ gen_require(`
+ type oa_system_server_packet_t;
+ ')
+
+ allow $1 oa_system_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_oa_system_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the oracledb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the oracledb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the oracledb port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_oracledb_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_oracledb_port'($*)) dnl
+
+ gen_require(`
+ type oracledb_port_t;
+ ')
+
+ allow $1 oracledb_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_oracledb_port'($*)) dnl
+
+ gen_require(`
+ type oracledb_port_t;
+ ')
+
+ allow $1 oracledb_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_oracledb_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the oracledb port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_oracledb_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_oracledb_port'($*)) dnl
+
+ gen_require(`
+ type oracledb_port_t;
+ ')
+
+ allow $1 oracledb_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_oracledb_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send oracledb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_oracledb_client_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_client_packet_t;
+ ')
+
+ allow $1 oracledb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send oracledb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oracledb_client_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_client_packet_t;
+ ')
+
+ dontaudit $1 oracledb_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive oracledb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_oracledb_client_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_client_packet_t;
+ ')
+
+ allow $1 oracledb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive oracledb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oracledb_client_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_client_packet_t;
+ ')
+
+ dontaudit $1 oracledb_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive oracledb_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oracledb_client_packets'($*)) dnl
+
+ corenet_send_oracledb_client_packets($1)
+ corenet_receive_oracledb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive oracledb_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oracledb_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_oracledb_client_packets($1)
+ corenet_dontaudit_receive_oracledb_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oracledb_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to oracledb_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_oracledb_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oracledb_client_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_client_packet_t;
+ ')
+
+ allow $1 oracledb_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_oracledb_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send oracledb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_oracledb_server_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_server_packet_t;
+ ')
+
+ allow $1 oracledb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send oracledb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_oracledb_server_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_server_packet_t;
+ ')
+
+ dontaudit $1 oracledb_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive oracledb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_oracledb_server_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_server_packet_t;
+ ')
+
+ allow $1 oracledb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive oracledb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_oracledb_server_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_server_packet_t;
+ ')
+
+ dontaudit $1 oracledb_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive oracledb_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_oracledb_server_packets'($*)) dnl
+
+ corenet_send_oracledb_server_packets($1)
+ corenet_receive_oracledb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive oracledb_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_oracledb_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_oracledb_server_packets($1)
+ corenet_dontaudit_receive_oracledb_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_oracledb_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to oracledb_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_oracledb_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_oracledb_server_packets'($*)) dnl
+
+ gen_require(`
+ type oracledb_server_packet_t;
+ ')
+
+ allow $1 oracledb_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_oracledb_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ocsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ocsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ocsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ocsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ocsp_port'($*)) dnl
+
+ gen_require(`
+ type ocsp_port_t;
+ ')
+
+ allow $1 ocsp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ocsp_port'($*)) dnl
+
+ gen_require(`
+ type ocsp_port_t;
+ ')
+
+ allow $1 ocsp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ocsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ocsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ocsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ocsp_port'($*)) dnl
+
+ gen_require(`
+ type ocsp_port_t;
+ ')
+
+ allow $1 ocsp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ocsp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ocsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ocsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_client_packet_t;
+ ')
+
+ allow $1 ocsp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ocsp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ocsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_client_packet_t;
+ ')
+
+ dontaudit $1 ocsp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ocsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ocsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_client_packet_t;
+ ')
+
+ allow $1 ocsp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ocsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ocsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_client_packet_t;
+ ')
+
+ dontaudit $1 ocsp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ocsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ocsp_client_packets'($*)) dnl
+
+ corenet_send_ocsp_client_packets($1)
+ corenet_receive_ocsp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ocsp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ocsp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ocsp_client_packets($1)
+ corenet_dontaudit_receive_ocsp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ocsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ocsp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ocsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ocsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_client_packet_t;
+ ')
+
+ allow $1 ocsp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ocsp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ocsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ocsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_server_packet_t;
+ ')
+
+ allow $1 ocsp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ocsp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ocsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_server_packet_t;
+ ')
+
+ dontaudit $1 ocsp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ocsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ocsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_server_packet_t;
+ ')
+
+ allow $1 ocsp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ocsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ocsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_server_packet_t;
+ ')
+
+ dontaudit $1 ocsp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ocsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ocsp_server_packets'($*)) dnl
+
+ corenet_send_ocsp_server_packets($1)
+ corenet_receive_ocsp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ocsp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ocsp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ocsp_server_packets($1)
+ corenet_dontaudit_receive_ocsp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ocsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ocsp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ocsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ocsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ocsp_server_packet_t;
+ ')
+
+ allow $1 ocsp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ocsp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the openhpid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the openhpid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the openhpid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_openhpid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_openhpid_port'($*)) dnl
+
+ gen_require(`
+ type openhpid_port_t;
+ ')
+
+ allow $1 openhpid_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_openhpid_port'($*)) dnl
+
+ gen_require(`
+ type openhpid_port_t;
+ ')
+
+ allow $1 openhpid_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_openhpid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the openhpid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_openhpid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_openhpid_port'($*)) dnl
+
+ gen_require(`
+ type openhpid_port_t;
+ ')
+
+ allow $1 openhpid_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_openhpid_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send openhpid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_openhpid_client_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_client_packet_t;
+ ')
+
+ allow $1 openhpid_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send openhpid_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openhpid_client_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_client_packet_t;
+ ')
+
+ dontaudit $1 openhpid_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive openhpid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_openhpid_client_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_client_packet_t;
+ ')
+
+ allow $1 openhpid_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive openhpid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openhpid_client_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_client_packet_t;
+ ')
+
+ dontaudit $1 openhpid_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive openhpid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openhpid_client_packets'($*)) dnl
+
+ corenet_send_openhpid_client_packets($1)
+ corenet_receive_openhpid_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive openhpid_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openhpid_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_openhpid_client_packets($1)
+ corenet_dontaudit_receive_openhpid_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openhpid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to openhpid_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_openhpid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openhpid_client_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_client_packet_t;
+ ')
+
+ allow $1 openhpid_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_openhpid_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send openhpid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_openhpid_server_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_server_packet_t;
+ ')
+
+ allow $1 openhpid_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send openhpid_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openhpid_server_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_server_packet_t;
+ ')
+
+ dontaudit $1 openhpid_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive openhpid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_openhpid_server_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_server_packet_t;
+ ')
+
+ allow $1 openhpid_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive openhpid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openhpid_server_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_server_packet_t;
+ ')
+
+ dontaudit $1 openhpid_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive openhpid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openhpid_server_packets'($*)) dnl
+
+ corenet_send_openhpid_server_packets($1)
+ corenet_receive_openhpid_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive openhpid_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openhpid_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_openhpid_server_packets($1)
+ corenet_dontaudit_receive_openhpid_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openhpid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to openhpid_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_openhpid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openhpid_server_packets'($*)) dnl
+
+ gen_require(`
+ type openhpid_server_packet_t;
+ ')
+
+ allow $1 openhpid_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_openhpid_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the openvpn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the openvpn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the openvpn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_openvpn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_openvpn_port'($*)) dnl
+
+ gen_require(`
+ type openvpn_port_t;
+ ')
+
+ allow $1 openvpn_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_openvpn_port'($*)) dnl
+
+ gen_require(`
+ type openvpn_port_t;
+ ')
+
+ allow $1 openvpn_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_openvpn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the openvpn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_openvpn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_openvpn_port'($*)) dnl
+
+ gen_require(`
+ type openvpn_port_t;
+ ')
+
+ allow $1 openvpn_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_openvpn_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send openvpn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_openvpn_client_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_client_packet_t;
+ ')
+
+ allow $1 openvpn_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send openvpn_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openvpn_client_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_client_packet_t;
+ ')
+
+ dontaudit $1 openvpn_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive openvpn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_openvpn_client_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_client_packet_t;
+ ')
+
+ allow $1 openvpn_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive openvpn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openvpn_client_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_client_packet_t;
+ ')
+
+ dontaudit $1 openvpn_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive openvpn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openvpn_client_packets'($*)) dnl
+
+ corenet_send_openvpn_client_packets($1)
+ corenet_receive_openvpn_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive openvpn_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openvpn_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_openvpn_client_packets($1)
+ corenet_dontaudit_receive_openvpn_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openvpn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to openvpn_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_openvpn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openvpn_client_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_client_packet_t;
+ ')
+
+ allow $1 openvpn_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_openvpn_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send openvpn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_openvpn_server_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_server_packet_t;
+ ')
+
+ allow $1 openvpn_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send openvpn_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_openvpn_server_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_server_packet_t;
+ ')
+
+ dontaudit $1 openvpn_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive openvpn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_openvpn_server_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_server_packet_t;
+ ')
+
+ allow $1 openvpn_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive openvpn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_openvpn_server_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_server_packet_t;
+ ')
+
+ dontaudit $1 openvpn_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive openvpn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_openvpn_server_packets'($*)) dnl
+
+ corenet_send_openvpn_server_packets($1)
+ corenet_receive_openvpn_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive openvpn_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_openvpn_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_openvpn_server_packets($1)
+ corenet_dontaudit_receive_openvpn_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_openvpn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to openvpn_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_openvpn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_openvpn_server_packets'($*)) dnl
+
+ gen_require(`
+ type openvpn_server_packet_t;
+ ')
+
+ allow $1 openvpn_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_openvpn_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pdps port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pdps port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pdps port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pdps_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pdps_port'($*)) dnl
+
+ gen_require(`
+ type pdps_port_t;
+ ')
+
+ allow $1 pdps_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pdps_port'($*)) dnl
+
+ gen_require(`
+ type pdps_port_t;
+ ')
+
+ allow $1 pdps_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pdps_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pdps port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pdps_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pdps_port'($*)) dnl
+
+ gen_require(`
+ type pdps_port_t;
+ ')
+
+ allow $1 pdps_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pdps_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pdps_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pdps_client_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_client_packet_t;
+ ')
+
+ allow $1 pdps_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pdps_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pdps_client_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_client_packet_t;
+ ')
+
+ dontaudit $1 pdps_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pdps_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pdps_client_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_client_packet_t;
+ ')
+
+ allow $1 pdps_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pdps_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pdps_client_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_client_packet_t;
+ ')
+
+ dontaudit $1 pdps_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pdps_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pdps_client_packets'($*)) dnl
+
+ corenet_send_pdps_client_packets($1)
+ corenet_receive_pdps_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pdps_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pdps_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pdps_client_packets($1)
+ corenet_dontaudit_receive_pdps_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pdps_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pdps_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pdps_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pdps_client_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_client_packet_t;
+ ')
+
+ allow $1 pdps_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pdps_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pdps_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pdps_server_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_server_packet_t;
+ ')
+
+ allow $1 pdps_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pdps_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pdps_server_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_server_packet_t;
+ ')
+
+ dontaudit $1 pdps_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pdps_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pdps_server_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_server_packet_t;
+ ')
+
+ allow $1 pdps_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pdps_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pdps_server_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_server_packet_t;
+ ')
+
+ dontaudit $1 pdps_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pdps_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pdps_server_packets'($*)) dnl
+
+ corenet_send_pdps_server_packets($1)
+ corenet_receive_pdps_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pdps_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pdps_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pdps_server_packets($1)
+ corenet_dontaudit_receive_pdps_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pdps_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pdps_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pdps_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pdps_server_packets'($*)) dnl
+
+ gen_require(`
+ type pdps_server_packet_t;
+ ')
+
+ allow $1 pdps_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pdps_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pegasus_http port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pegasus_http_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pegasus_http_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_port_t;
+ ')
+
+ allow $1 pegasus_http_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pegasus_http_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_port_t;
+ ')
+
+ allow $1 pegasus_http_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pegasus_http_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pegasus_http port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pegasus_http_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pegasus_http_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_port_t;
+ ')
+
+ allow $1 pegasus_http_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pegasus_http_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pegasus_http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_client_packet_t;
+ ')
+
+ allow $1 pegasus_http_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pegasus_http_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_client_packet_t;
+ ')
+
+ dontaudit $1 pegasus_http_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pegasus_http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_client_packet_t;
+ ')
+
+ allow $1 pegasus_http_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pegasus_http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_client_packet_t;
+ ')
+
+ dontaudit $1 pegasus_http_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pegasus_http_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_http_client_packets'($*)) dnl
+
+ corenet_send_pegasus_http_client_packets($1)
+ corenet_receive_pegasus_http_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pegasus_http_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_http_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pegasus_http_client_packets($1)
+ corenet_dontaudit_receive_pegasus_http_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pegasus_http_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pegasus_http_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_http_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_client_packet_t;
+ ')
+
+ allow $1 pegasus_http_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_http_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pegasus_http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_server_packet_t;
+ ')
+
+ allow $1 pegasus_http_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pegasus_http_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_server_packet_t;
+ ')
+
+ dontaudit $1 pegasus_http_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pegasus_http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_server_packet_t;
+ ')
+
+ allow $1 pegasus_http_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pegasus_http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_server_packet_t;
+ ')
+
+ dontaudit $1 pegasus_http_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pegasus_http_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_http_server_packets'($*)) dnl
+
+ corenet_send_pegasus_http_server_packets($1)
+ corenet_receive_pegasus_http_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pegasus_http_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_http_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pegasus_http_server_packets($1)
+ corenet_dontaudit_receive_pegasus_http_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pegasus_http_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pegasus_http_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_http_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_http_server_packet_t;
+ ')
+
+ allow $1 pegasus_http_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_http_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pegasus_https port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pegasus_https_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pegasus_https_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_port_t;
+ ')
+
+ allow $1 pegasus_https_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pegasus_https_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_port_t;
+ ')
+
+ allow $1 pegasus_https_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pegasus_https_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pegasus_https port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pegasus_https_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pegasus_https_port'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_port_t;
+ ')
+
+ allow $1 pegasus_https_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pegasus_https_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pegasus_https_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_https_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_client_packet_t;
+ ')
+
+ allow $1 pegasus_https_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pegasus_https_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_https_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_client_packet_t;
+ ')
+
+ dontaudit $1 pegasus_https_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pegasus_https_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_https_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_client_packet_t;
+ ')
+
+ allow $1 pegasus_https_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pegasus_https_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_https_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_client_packet_t;
+ ')
+
+ dontaudit $1 pegasus_https_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pegasus_https_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_https_client_packets'($*)) dnl
+
+ corenet_send_pegasus_https_client_packets($1)
+ corenet_receive_pegasus_https_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pegasus_https_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_https_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pegasus_https_client_packets($1)
+ corenet_dontaudit_receive_pegasus_https_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pegasus_https_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pegasus_https_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_https_client_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_client_packet_t;
+ ')
+
+ allow $1 pegasus_https_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_https_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pegasus_https_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pegasus_https_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_server_packet_t;
+ ')
+
+ allow $1 pegasus_https_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pegasus_https_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pegasus_https_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_server_packet_t;
+ ')
+
+ dontaudit $1 pegasus_https_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pegasus_https_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pegasus_https_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_server_packet_t;
+ ')
+
+ allow $1 pegasus_https_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pegasus_https_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pegasus_https_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_server_packet_t;
+ ')
+
+ dontaudit $1 pegasus_https_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pegasus_https_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pegasus_https_server_packets'($*)) dnl
+
+ corenet_send_pegasus_https_server_packets($1)
+ corenet_receive_pegasus_https_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pegasus_https_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pegasus_https_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pegasus_https_server_packets($1)
+ corenet_dontaudit_receive_pegasus_https_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pegasus_https_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pegasus_https_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pegasus_https_server_packets'($*)) dnl
+
+ gen_require(`
+ type pegasus_https_server_packet_t;
+ ')
+
+ allow $1 pegasus_https_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pegasus_https_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pgpkeyserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pgpkeyserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pgpkeyserver_port'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_port_t;
+ ')
+
+ allow $1 pgpkeyserver_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pgpkeyserver_port'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_port_t;
+ ')
+
+ allow $1 pgpkeyserver_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pgpkeyserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pgpkeyserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pgpkeyserver_port'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_port_t;
+ ')
+
+ allow $1 pgpkeyserver_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pgpkeyserver_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pgpkeyserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pgpkeyserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_client_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pgpkeyserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pgpkeyserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_client_packet_t;
+ ')
+
+ dontaudit $1 pgpkeyserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pgpkeyserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pgpkeyserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_client_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pgpkeyserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pgpkeyserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_client_packet_t;
+ ')
+
+ dontaudit $1 pgpkeyserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pgpkeyserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pgpkeyserver_client_packets'($*)) dnl
+
+ corenet_send_pgpkeyserver_client_packets($1)
+ corenet_receive_pgpkeyserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pgpkeyserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pgpkeyserver_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pgpkeyserver_client_packets($1)
+ corenet_dontaudit_receive_pgpkeyserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pgpkeyserver_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pgpkeyserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pgpkeyserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_client_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pgpkeyserver_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pgpkeyserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pgpkeyserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_server_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pgpkeyserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pgpkeyserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_server_packet_t;
+ ')
+
+ dontaudit $1 pgpkeyserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pgpkeyserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pgpkeyserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_server_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pgpkeyserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pgpkeyserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_server_packet_t;
+ ')
+
+ dontaudit $1 pgpkeyserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pgpkeyserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pgpkeyserver_server_packets'($*)) dnl
+
+ corenet_send_pgpkeyserver_server_packets($1)
+ corenet_receive_pgpkeyserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pgpkeyserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pgpkeyserver_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pgpkeyserver_server_packets($1)
+ corenet_dontaudit_receive_pgpkeyserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pgpkeyserver_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pgpkeyserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pgpkeyserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type pgpkeyserver_server_packet_t;
+ ')
+
+ allow $1 pgpkeyserver_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pgpkeyserver_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pingd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pingd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pingd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pingd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pingd_port'($*)) dnl
+
+ gen_require(`
+ type pingd_port_t;
+ ')
+
+ allow $1 pingd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pingd_port'($*)) dnl
+
+ gen_require(`
+ type pingd_port_t;
+ ')
+
+ allow $1 pingd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pingd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pingd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pingd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pingd_port'($*)) dnl
+
+ gen_require(`
+ type pingd_port_t;
+ ')
+
+ allow $1 pingd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pingd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pingd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pingd_client_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_client_packet_t;
+ ')
+
+ allow $1 pingd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pingd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pingd_client_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_client_packet_t;
+ ')
+
+ dontaudit $1 pingd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pingd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pingd_client_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_client_packet_t;
+ ')
+
+ allow $1 pingd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pingd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pingd_client_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_client_packet_t;
+ ')
+
+ dontaudit $1 pingd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pingd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pingd_client_packets'($*)) dnl
+
+ corenet_send_pingd_client_packets($1)
+ corenet_receive_pingd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pingd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pingd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pingd_client_packets($1)
+ corenet_dontaudit_receive_pingd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pingd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pingd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pingd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pingd_client_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_client_packet_t;
+ ')
+
+ allow $1 pingd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pingd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pingd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pingd_server_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_server_packet_t;
+ ')
+
+ allow $1 pingd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pingd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pingd_server_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_server_packet_t;
+ ')
+
+ dontaudit $1 pingd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pingd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pingd_server_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_server_packet_t;
+ ')
+
+ allow $1 pingd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pingd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pingd_server_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_server_packet_t;
+ ')
+
+ dontaudit $1 pingd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pingd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pingd_server_packets'($*)) dnl
+
+ corenet_send_pingd_server_packets($1)
+ corenet_receive_pingd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pingd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pingd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pingd_server_packets($1)
+ corenet_dontaudit_receive_pingd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pingd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pingd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pingd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pingd_server_packets'($*)) dnl
+
+ gen_require(`
+ type pingd_server_packet_t;
+ ')
+
+ allow $1 pingd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pingd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pktcable_cops port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pktcable_cops_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pktcable_cops_port'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_port_t;
+ ')
+
+ allow $1 pktcable_cops_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pktcable_cops_port'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_port_t;
+ ')
+
+ allow $1 pktcable_cops_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pktcable_cops_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pktcable_cops port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pktcable_cops_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pktcable_cops_port'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_port_t;
+ ')
+
+ allow $1 pktcable_cops_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pktcable_cops_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pktcable_cops_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pktcable_cops_client_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_client_packet_t;
+ ')
+
+ allow $1 pktcable_cops_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pktcable_cops_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pktcable_cops_client_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_client_packet_t;
+ ')
+
+ dontaudit $1 pktcable_cops_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pktcable_cops_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pktcable_cops_client_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_client_packet_t;
+ ')
+
+ allow $1 pktcable_cops_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pktcable_cops_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pktcable_cops_client_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_client_packet_t;
+ ')
+
+ dontaudit $1 pktcable_cops_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pktcable_cops_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pktcable_cops_client_packets'($*)) dnl
+
+ corenet_send_pktcable_cops_client_packets($1)
+ corenet_receive_pktcable_cops_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pktcable_cops_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pktcable_cops_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pktcable_cops_client_packets($1)
+ corenet_dontaudit_receive_pktcable_cops_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pktcable_cops_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pktcable_cops_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pktcable_cops_client_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_client_packet_t;
+ ')
+
+ allow $1 pktcable_cops_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pktcable_cops_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pktcable_cops_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pktcable_cops_server_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_server_packet_t;
+ ')
+
+ allow $1 pktcable_cops_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pktcable_cops_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pktcable_cops_server_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_server_packet_t;
+ ')
+
+ dontaudit $1 pktcable_cops_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pktcable_cops_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pktcable_cops_server_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_server_packet_t;
+ ')
+
+ allow $1 pktcable_cops_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pktcable_cops_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pktcable_cops_server_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_server_packet_t;
+ ')
+
+ dontaudit $1 pktcable_cops_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pktcable_cops_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pktcable_cops_server_packets'($*)) dnl
+
+ corenet_send_pktcable_cops_server_packets($1)
+ corenet_receive_pktcable_cops_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pktcable_cops_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pktcable_cops_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pktcable_cops_server_packets($1)
+ corenet_dontaudit_receive_pktcable_cops_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pktcable_cops_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pktcable_cops_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pktcable_cops_server_packets'($*)) dnl
+
+ gen_require(`
+ type pktcable_cops_server_packet_t;
+ ')
+
+ allow $1 pktcable_cops_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pktcable_cops_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pop port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pop_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pop_port'($*)) dnl
+
+ gen_require(`
+ type pop_port_t;
+ ')
+
+ allow $1 pop_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pop_port'($*)) dnl
+
+ gen_require(`
+ type pop_port_t;
+ ')
+
+ allow $1 pop_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pop_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pop port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pop_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pop_port'($*)) dnl
+
+ gen_require(`
+ type pop_port_t;
+ ')
+
+ allow $1 pop_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pop_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pop_client_packets'($*)) dnl
+
+ gen_require(`
+ type pop_client_packet_t;
+ ')
+
+ allow $1 pop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pop_client_packets'($*)) dnl
+
+ gen_require(`
+ type pop_client_packet_t;
+ ')
+
+ dontaudit $1 pop_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pop_client_packets'($*)) dnl
+
+ gen_require(`
+ type pop_client_packet_t;
+ ')
+
+ allow $1 pop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pop_client_packets'($*)) dnl
+
+ gen_require(`
+ type pop_client_packet_t;
+ ')
+
+ dontaudit $1 pop_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pop_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pop_client_packets'($*)) dnl
+
+ corenet_send_pop_client_packets($1)
+ corenet_receive_pop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pop_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pop_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pop_client_packets($1)
+ corenet_dontaudit_receive_pop_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pop_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pop_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pop_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pop_client_packets'($*)) dnl
+
+ gen_require(`
+ type pop_client_packet_t;
+ ')
+
+ allow $1 pop_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pop_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pop_server_packets'($*)) dnl
+
+ gen_require(`
+ type pop_server_packet_t;
+ ')
+
+ allow $1 pop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pop_server_packets'($*)) dnl
+
+ gen_require(`
+ type pop_server_packet_t;
+ ')
+
+ dontaudit $1 pop_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pop_server_packets'($*)) dnl
+
+ gen_require(`
+ type pop_server_packet_t;
+ ')
+
+ allow $1 pop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pop_server_packets'($*)) dnl
+
+ gen_require(`
+ type pop_server_packet_t;
+ ')
+
+ dontaudit $1 pop_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pop_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pop_server_packets'($*)) dnl
+
+ corenet_send_pop_server_packets($1)
+ corenet_receive_pop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pop_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pop_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pop_server_packets($1)
+ corenet_dontaudit_receive_pop_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pop_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pop_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pop_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pop_server_packets'($*)) dnl
+
+ gen_require(`
+ type pop_server_packet_t;
+ ')
+
+ allow $1 pop_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pop_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the portmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the portmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the portmap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_portmap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_portmap_port'($*)) dnl
+
+ gen_require(`
+ type portmap_port_t;
+ ')
+
+ allow $1 portmap_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_portmap_port'($*)) dnl
+
+ gen_require(`
+ type portmap_port_t;
+ ')
+
+ allow $1 portmap_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_portmap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the portmap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_portmap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_portmap_port'($*)) dnl
+
+ gen_require(`
+ type portmap_port_t;
+ ')
+
+ allow $1 portmap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_portmap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send portmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_portmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_client_packet_t;
+ ')
+
+ allow $1 portmap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send portmap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_portmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_client_packet_t;
+ ')
+
+ dontaudit $1 portmap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive portmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_portmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_client_packet_t;
+ ')
+
+ allow $1 portmap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive portmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_portmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_client_packet_t;
+ ')
+
+ dontaudit $1 portmap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive portmap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_portmap_client_packets'($*)) dnl
+
+ corenet_send_portmap_client_packets($1)
+ corenet_receive_portmap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive portmap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_portmap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_portmap_client_packets($1)
+ corenet_dontaudit_receive_portmap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_portmap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to portmap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_portmap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_portmap_client_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_client_packet_t;
+ ')
+
+ allow $1 portmap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_portmap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send portmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_portmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_server_packet_t;
+ ')
+
+ allow $1 portmap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send portmap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_portmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_server_packet_t;
+ ')
+
+ dontaudit $1 portmap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive portmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_portmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_server_packet_t;
+ ')
+
+ allow $1 portmap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive portmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_portmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_server_packet_t;
+ ')
+
+ dontaudit $1 portmap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive portmap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_portmap_server_packets'($*)) dnl
+
+ corenet_send_portmap_server_packets($1)
+ corenet_receive_portmap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive portmap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_portmap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_portmap_server_packets($1)
+ corenet_dontaudit_receive_portmap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_portmap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to portmap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_portmap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_portmap_server_packets'($*)) dnl
+
+ gen_require(`
+ type portmap_server_packet_t;
+ ')
+
+ allow $1 portmap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_portmap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the postfix_policyd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postfix_policyd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postfix_policyd_port'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_port_t;
+ ')
+
+ allow $1 postfix_policyd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postfix_policyd_port'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_port_t;
+ ')
+
+ allow $1 postfix_policyd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postfix_policyd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the postfix_policyd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_postfix_policyd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postfix_policyd_port'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_port_t;
+ ')
+
+ allow $1 postfix_policyd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postfix_policyd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postfix_policyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postfix_policyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_client_packet_t;
+ ')
+
+ allow $1 postfix_policyd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postfix_policyd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postfix_policyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_client_packet_t;
+ ')
+
+ dontaudit $1 postfix_policyd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postfix_policyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postfix_policyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_client_packet_t;
+ ')
+
+ allow $1 postfix_policyd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postfix_policyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postfix_policyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_client_packet_t;
+ ')
+
+ dontaudit $1 postfix_policyd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postfix_policyd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postfix_policyd_client_packets'($*)) dnl
+
+ corenet_send_postfix_policyd_client_packets($1)
+ corenet_receive_postfix_policyd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postfix_policyd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postfix_policyd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_postfix_policyd_client_packets($1)
+ corenet_dontaudit_receive_postfix_policyd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postfix_policyd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postfix_policyd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postfix_policyd_client_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_client_packet_t;
+ ')
+
+ allow $1 postfix_policyd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postfix_policyd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postfix_policyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postfix_policyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_server_packet_t;
+ ')
+
+ allow $1 postfix_policyd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postfix_policyd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postfix_policyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_server_packet_t;
+ ')
+
+ dontaudit $1 postfix_policyd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postfix_policyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postfix_policyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_server_packet_t;
+ ')
+
+ allow $1 postfix_policyd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postfix_policyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postfix_policyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_server_packet_t;
+ ')
+
+ dontaudit $1 postfix_policyd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postfix_policyd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postfix_policyd_server_packets'($*)) dnl
+
+ corenet_send_postfix_policyd_server_packets($1)
+ corenet_receive_postfix_policyd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postfix_policyd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postfix_policyd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_postfix_policyd_server_packets($1)
+ corenet_dontaudit_receive_postfix_policyd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postfix_policyd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postfix_policyd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postfix_policyd_server_packets'($*)) dnl
+
+ gen_require(`
+ type postfix_policyd_server_packet_t;
+ ')
+
+ allow $1 postfix_policyd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postfix_policyd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the postgresql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the postgresql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the postgresql port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postgresql_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postgresql_port'($*)) dnl
+
+ gen_require(`
+ type postgresql_port_t;
+ ')
+
+ allow $1 postgresql_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postgresql_port'($*)) dnl
+
+ gen_require(`
+ type postgresql_port_t;
+ ')
+
+ allow $1 postgresql_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postgresql_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the postgresql port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_postgresql_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postgresql_port'($*)) dnl
+
+ gen_require(`
+ type postgresql_port_t;
+ ')
+
+ allow $1 postgresql_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postgresql_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postgresql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postgresql_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_client_packet_t;
+ ')
+
+ allow $1 postgresql_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postgresql_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgresql_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_client_packet_t;
+ ')
+
+ dontaudit $1 postgresql_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postgresql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postgresql_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_client_packet_t;
+ ')
+
+ allow $1 postgresql_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postgresql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgresql_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_client_packet_t;
+ ')
+
+ dontaudit $1 postgresql_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postgresql_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgresql_client_packets'($*)) dnl
+
+ corenet_send_postgresql_client_packets($1)
+ corenet_receive_postgresql_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postgresql_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgresql_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_postgresql_client_packets($1)
+ corenet_dontaudit_receive_postgresql_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgresql_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postgresql_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postgresql_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgresql_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_client_packet_t;
+ ')
+
+ allow $1 postgresql_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgresql_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postgresql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postgresql_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_server_packet_t;
+ ')
+
+ allow $1 postgresql_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postgresql_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgresql_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_server_packet_t;
+ ')
+
+ dontaudit $1 postgresql_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postgresql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postgresql_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_server_packet_t;
+ ')
+
+ allow $1 postgresql_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postgresql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgresql_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_server_packet_t;
+ ')
+
+ dontaudit $1 postgresql_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postgresql_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgresql_server_packets'($*)) dnl
+
+ corenet_send_postgresql_server_packets($1)
+ corenet_receive_postgresql_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postgresql_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgresql_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_postgresql_server_packets($1)
+ corenet_dontaudit_receive_postgresql_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgresql_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postgresql_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postgresql_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgresql_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgresql_server_packet_t;
+ ')
+
+ allow $1 postgresql_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgresql_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the postgrey port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the postgrey port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the postgrey port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_postgrey_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_postgrey_port'($*)) dnl
+
+ gen_require(`
+ type postgrey_port_t;
+ ')
+
+ allow $1 postgrey_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_postgrey_port'($*)) dnl
+
+ gen_require(`
+ type postgrey_port_t;
+ ')
+
+ allow $1 postgrey_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_postgrey_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the postgrey port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_postgrey_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_postgrey_port'($*)) dnl
+
+ gen_require(`
+ type postgrey_port_t;
+ ')
+
+ allow $1 postgrey_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_postgrey_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postgrey_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postgrey_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_client_packet_t;
+ ')
+
+ allow $1 postgrey_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postgrey_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgrey_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_client_packet_t;
+ ')
+
+ dontaudit $1 postgrey_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postgrey_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postgrey_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_client_packet_t;
+ ')
+
+ allow $1 postgrey_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postgrey_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgrey_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_client_packet_t;
+ ')
+
+ dontaudit $1 postgrey_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postgrey_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgrey_client_packets'($*)) dnl
+
+ corenet_send_postgrey_client_packets($1)
+ corenet_receive_postgrey_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postgrey_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgrey_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_postgrey_client_packets($1)
+ corenet_dontaudit_receive_postgrey_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgrey_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postgrey_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postgrey_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgrey_client_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_client_packet_t;
+ ')
+
+ allow $1 postgrey_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgrey_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send postgrey_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_postgrey_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_server_packet_t;
+ ')
+
+ allow $1 postgrey_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send postgrey_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_postgrey_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_server_packet_t;
+ ')
+
+ dontaudit $1 postgrey_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive postgrey_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_postgrey_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_server_packet_t;
+ ')
+
+ allow $1 postgrey_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive postgrey_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_postgrey_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_server_packet_t;
+ ')
+
+ dontaudit $1 postgrey_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive postgrey_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_postgrey_server_packets'($*)) dnl
+
+ corenet_send_postgrey_server_packets($1)
+ corenet_receive_postgrey_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive postgrey_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_postgrey_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_postgrey_server_packets($1)
+ corenet_dontaudit_receive_postgrey_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_postgrey_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to postgrey_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_postgrey_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_postgrey_server_packets'($*)) dnl
+
+ gen_require(`
+ type postgrey_server_packet_t;
+ ')
+
+ allow $1 postgrey_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_postgrey_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pptp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pptp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pptp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pptp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pptp_port'($*)) dnl
+
+ gen_require(`
+ type pptp_port_t;
+ ')
+
+ allow $1 pptp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pptp_port'($*)) dnl
+
+ gen_require(`
+ type pptp_port_t;
+ ')
+
+ allow $1 pptp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pptp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pptp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pptp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pptp_port'($*)) dnl
+
+ gen_require(`
+ type pptp_port_t;
+ ')
+
+ allow $1 pptp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pptp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pptp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pptp_client_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_client_packet_t;
+ ')
+
+ allow $1 pptp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pptp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pptp_client_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_client_packet_t;
+ ')
+
+ dontaudit $1 pptp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pptp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pptp_client_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_client_packet_t;
+ ')
+
+ allow $1 pptp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pptp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pptp_client_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_client_packet_t;
+ ')
+
+ dontaudit $1 pptp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pptp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pptp_client_packets'($*)) dnl
+
+ corenet_send_pptp_client_packets($1)
+ corenet_receive_pptp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pptp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pptp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pptp_client_packets($1)
+ corenet_dontaudit_receive_pptp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pptp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pptp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pptp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pptp_client_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_client_packet_t;
+ ')
+
+ allow $1 pptp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pptp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pptp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pptp_server_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_server_packet_t;
+ ')
+
+ allow $1 pptp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pptp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pptp_server_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_server_packet_t;
+ ')
+
+ dontaudit $1 pptp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pptp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pptp_server_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_server_packet_t;
+ ')
+
+ allow $1 pptp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pptp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pptp_server_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_server_packet_t;
+ ')
+
+ dontaudit $1 pptp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pptp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pptp_server_packets'($*)) dnl
+
+ corenet_send_pptp_server_packets($1)
+ corenet_receive_pptp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pptp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pptp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pptp_server_packets($1)
+ corenet_dontaudit_receive_pptp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pptp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pptp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pptp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pptp_server_packets'($*)) dnl
+
+ gen_require(`
+ type pptp_server_packet_t;
+ ')
+
+ allow $1 pptp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pptp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the prelude port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the prelude port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the prelude port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_prelude_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_prelude_port'($*)) dnl
+
+ gen_require(`
+ type prelude_port_t;
+ ')
+
+ allow $1 prelude_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_prelude_port'($*)) dnl
+
+ gen_require(`
+ type prelude_port_t;
+ ')
+
+ allow $1 prelude_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_prelude_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the prelude port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_prelude_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_prelude_port'($*)) dnl
+
+ gen_require(`
+ type prelude_port_t;
+ ')
+
+ allow $1 prelude_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_prelude_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send prelude_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_prelude_client_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_client_packet_t;
+ ')
+
+ allow $1 prelude_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send prelude_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_prelude_client_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_client_packet_t;
+ ')
+
+ dontaudit $1 prelude_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive prelude_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_prelude_client_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_client_packet_t;
+ ')
+
+ allow $1 prelude_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive prelude_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_prelude_client_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_client_packet_t;
+ ')
+
+ dontaudit $1 prelude_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive prelude_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_prelude_client_packets'($*)) dnl
+
+ corenet_send_prelude_client_packets($1)
+ corenet_receive_prelude_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive prelude_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_prelude_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_prelude_client_packets($1)
+ corenet_dontaudit_receive_prelude_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_prelude_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to prelude_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_prelude_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_prelude_client_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_client_packet_t;
+ ')
+
+ allow $1 prelude_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_prelude_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send prelude_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_prelude_server_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_server_packet_t;
+ ')
+
+ allow $1 prelude_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send prelude_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_prelude_server_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_server_packet_t;
+ ')
+
+ dontaudit $1 prelude_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive prelude_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_prelude_server_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_server_packet_t;
+ ')
+
+ allow $1 prelude_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive prelude_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_prelude_server_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_server_packet_t;
+ ')
+
+ dontaudit $1 prelude_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive prelude_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_prelude_server_packets'($*)) dnl
+
+ corenet_send_prelude_server_packets($1)
+ corenet_receive_prelude_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive prelude_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_prelude_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_prelude_server_packets($1)
+ corenet_dontaudit_receive_prelude_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_prelude_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to prelude_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_prelude_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_prelude_server_packets'($*)) dnl
+
+ gen_require(`
+ type prelude_server_packet_t;
+ ')
+
+ allow $1 prelude_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_prelude_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the presence port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the presence port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the presence port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_presence_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_presence_port'($*)) dnl
+
+ gen_require(`
+ type presence_port_t;
+ ')
+
+ allow $1 presence_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_presence_port'($*)) dnl
+
+ gen_require(`
+ type presence_port_t;
+ ')
+
+ allow $1 presence_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_presence_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the presence port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_presence_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_presence_port'($*)) dnl
+
+ gen_require(`
+ type presence_port_t;
+ ')
+
+ allow $1 presence_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_presence_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send presence_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_presence_client_packets'($*)) dnl
+
+ gen_require(`
+ type presence_client_packet_t;
+ ')
+
+ allow $1 presence_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send presence_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_presence_client_packets'($*)) dnl
+
+ gen_require(`
+ type presence_client_packet_t;
+ ')
+
+ dontaudit $1 presence_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive presence_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_presence_client_packets'($*)) dnl
+
+ gen_require(`
+ type presence_client_packet_t;
+ ')
+
+ allow $1 presence_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive presence_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_presence_client_packets'($*)) dnl
+
+ gen_require(`
+ type presence_client_packet_t;
+ ')
+
+ dontaudit $1 presence_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive presence_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_presence_client_packets'($*)) dnl
+
+ corenet_send_presence_client_packets($1)
+ corenet_receive_presence_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive presence_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_presence_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_presence_client_packets($1)
+ corenet_dontaudit_receive_presence_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_presence_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to presence_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_presence_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_presence_client_packets'($*)) dnl
+
+ gen_require(`
+ type presence_client_packet_t;
+ ')
+
+ allow $1 presence_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_presence_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send presence_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_presence_server_packets'($*)) dnl
+
+ gen_require(`
+ type presence_server_packet_t;
+ ')
+
+ allow $1 presence_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send presence_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_presence_server_packets'($*)) dnl
+
+ gen_require(`
+ type presence_server_packet_t;
+ ')
+
+ dontaudit $1 presence_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive presence_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_presence_server_packets'($*)) dnl
+
+ gen_require(`
+ type presence_server_packet_t;
+ ')
+
+ allow $1 presence_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive presence_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_presence_server_packets'($*)) dnl
+
+ gen_require(`
+ type presence_server_packet_t;
+ ')
+
+ dontaudit $1 presence_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive presence_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_presence_server_packets'($*)) dnl
+
+ corenet_send_presence_server_packets($1)
+ corenet_receive_presence_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive presence_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_presence_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_presence_server_packets($1)
+ corenet_dontaudit_receive_presence_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_presence_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to presence_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_presence_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_presence_server_packets'($*)) dnl
+
+ gen_require(`
+ type presence_server_packet_t;
+ ')
+
+ allow $1 presence_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_presence_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the printer port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the printer port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the printer port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_printer_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_printer_port'($*)) dnl
+
+ gen_require(`
+ type printer_port_t;
+ ')
+
+ allow $1 printer_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_printer_port'($*)) dnl
+
+ gen_require(`
+ type printer_port_t;
+ ')
+
+ allow $1 printer_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_printer_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the printer port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_printer_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_printer_port'($*)) dnl
+
+ gen_require(`
+ type printer_port_t;
+ ')
+
+ allow $1 printer_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_printer_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send printer_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_printer_client_packets'($*)) dnl
+
+ gen_require(`
+ type printer_client_packet_t;
+ ')
+
+ allow $1 printer_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send printer_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_printer_client_packets'($*)) dnl
+
+ gen_require(`
+ type printer_client_packet_t;
+ ')
+
+ dontaudit $1 printer_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive printer_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_printer_client_packets'($*)) dnl
+
+ gen_require(`
+ type printer_client_packet_t;
+ ')
+
+ allow $1 printer_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive printer_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_printer_client_packets'($*)) dnl
+
+ gen_require(`
+ type printer_client_packet_t;
+ ')
+
+ dontaudit $1 printer_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive printer_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_printer_client_packets'($*)) dnl
+
+ corenet_send_printer_client_packets($1)
+ corenet_receive_printer_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive printer_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_printer_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_printer_client_packets($1)
+ corenet_dontaudit_receive_printer_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_printer_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to printer_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_printer_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_printer_client_packets'($*)) dnl
+
+ gen_require(`
+ type printer_client_packet_t;
+ ')
+
+ allow $1 printer_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_printer_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send printer_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_printer_server_packets'($*)) dnl
+
+ gen_require(`
+ type printer_server_packet_t;
+ ')
+
+ allow $1 printer_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send printer_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_printer_server_packets'($*)) dnl
+
+ gen_require(`
+ type printer_server_packet_t;
+ ')
+
+ dontaudit $1 printer_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive printer_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_printer_server_packets'($*)) dnl
+
+ gen_require(`
+ type printer_server_packet_t;
+ ')
+
+ allow $1 printer_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive printer_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_printer_server_packets'($*)) dnl
+
+ gen_require(`
+ type printer_server_packet_t;
+ ')
+
+ dontaudit $1 printer_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive printer_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_printer_server_packets'($*)) dnl
+
+ corenet_send_printer_server_packets($1)
+ corenet_receive_printer_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive printer_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_printer_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_printer_server_packets($1)
+ corenet_dontaudit_receive_printer_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_printer_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to printer_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_printer_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_printer_server_packets'($*)) dnl
+
+ gen_require(`
+ type printer_server_packet_t;
+ ')
+
+ allow $1 printer_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_printer_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ptal port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ptal port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ptal port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ptal_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ptal_port'($*)) dnl
+
+ gen_require(`
+ type ptal_port_t;
+ ')
+
+ allow $1 ptal_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ptal_port'($*)) dnl
+
+ gen_require(`
+ type ptal_port_t;
+ ')
+
+ allow $1 ptal_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ptal_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ptal port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ptal_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ptal_port'($*)) dnl
+
+ gen_require(`
+ type ptal_port_t;
+ ')
+
+ allow $1 ptal_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ptal_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ptal_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ptal_client_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_client_packet_t;
+ ')
+
+ allow $1 ptal_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ptal_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ptal_client_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_client_packet_t;
+ ')
+
+ dontaudit $1 ptal_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ptal_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ptal_client_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_client_packet_t;
+ ')
+
+ allow $1 ptal_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ptal_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ptal_client_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_client_packet_t;
+ ')
+
+ dontaudit $1 ptal_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ptal_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ptal_client_packets'($*)) dnl
+
+ corenet_send_ptal_client_packets($1)
+ corenet_receive_ptal_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ptal_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ptal_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ptal_client_packets($1)
+ corenet_dontaudit_receive_ptal_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ptal_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ptal_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ptal_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ptal_client_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_client_packet_t;
+ ')
+
+ allow $1 ptal_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ptal_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ptal_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ptal_server_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_server_packet_t;
+ ')
+
+ allow $1 ptal_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ptal_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ptal_server_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_server_packet_t;
+ ')
+
+ dontaudit $1 ptal_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ptal_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ptal_server_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_server_packet_t;
+ ')
+
+ allow $1 ptal_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ptal_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ptal_server_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_server_packet_t;
+ ')
+
+ dontaudit $1 ptal_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ptal_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ptal_server_packets'($*)) dnl
+
+ corenet_send_ptal_server_packets($1)
+ corenet_receive_ptal_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ptal_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ptal_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ptal_server_packets($1)
+ corenet_dontaudit_receive_ptal_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ptal_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ptal_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ptal_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ptal_server_packets'($*)) dnl
+
+ gen_require(`
+ type ptal_server_packet_t;
+ ')
+
+ allow $1 ptal_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ptal_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pulseaudio port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pulseaudio_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pulseaudio_port'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_port_t;
+ ')
+
+ allow $1 pulseaudio_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pulseaudio_port'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_port_t;
+ ')
+
+ allow $1 pulseaudio_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pulseaudio_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pulseaudio port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pulseaudio_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pulseaudio_port'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_port_t;
+ ')
+
+ allow $1 pulseaudio_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pulseaudio_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pulseaudio_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pulseaudio_client_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_client_packet_t;
+ ')
+
+ allow $1 pulseaudio_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pulseaudio_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pulseaudio_client_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_client_packet_t;
+ ')
+
+ dontaudit $1 pulseaudio_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pulseaudio_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pulseaudio_client_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_client_packet_t;
+ ')
+
+ allow $1 pulseaudio_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pulseaudio_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pulseaudio_client_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_client_packet_t;
+ ')
+
+ dontaudit $1 pulseaudio_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pulseaudio_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pulseaudio_client_packets'($*)) dnl
+
+ corenet_send_pulseaudio_client_packets($1)
+ corenet_receive_pulseaudio_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pulseaudio_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pulseaudio_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pulseaudio_client_packets($1)
+ corenet_dontaudit_receive_pulseaudio_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pulseaudio_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pulseaudio_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pulseaudio_client_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_client_packet_t;
+ ')
+
+ allow $1 pulseaudio_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pulseaudio_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pulseaudio_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pulseaudio_server_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_server_packet_t;
+ ')
+
+ allow $1 pulseaudio_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pulseaudio_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pulseaudio_server_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_server_packet_t;
+ ')
+
+ dontaudit $1 pulseaudio_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pulseaudio_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pulseaudio_server_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_server_packet_t;
+ ')
+
+ allow $1 pulseaudio_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pulseaudio_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pulseaudio_server_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_server_packet_t;
+ ')
+
+ dontaudit $1 pulseaudio_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pulseaudio_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pulseaudio_server_packets'($*)) dnl
+
+ corenet_send_pulseaudio_server_packets($1)
+ corenet_receive_pulseaudio_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pulseaudio_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pulseaudio_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pulseaudio_server_packets($1)
+ corenet_dontaudit_receive_pulseaudio_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pulseaudio_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pulseaudio_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pulseaudio_server_packets'($*)) dnl
+
+ gen_require(`
+ type pulseaudio_server_packet_t;
+ ')
+
+ allow $1 pulseaudio_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pulseaudio_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the puppet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the puppet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the puppet port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_puppet_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_puppet_port'($*)) dnl
+
+ gen_require(`
+ type puppet_port_t;
+ ')
+
+ allow $1 puppet_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_puppet_port'($*)) dnl
+
+ gen_require(`
+ type puppet_port_t;
+ ')
+
+ allow $1 puppet_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_puppet_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the puppet port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_puppet_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_puppet_port'($*)) dnl
+
+ gen_require(`
+ type puppet_port_t;
+ ')
+
+ allow $1 puppet_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_puppet_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send puppet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_puppet_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_client_packet_t;
+ ')
+
+ allow $1 puppet_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send puppet_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppet_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_client_packet_t;
+ ')
+
+ dontaudit $1 puppet_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive puppet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_puppet_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_client_packet_t;
+ ')
+
+ allow $1 puppet_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive puppet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppet_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_client_packet_t;
+ ')
+
+ dontaudit $1 puppet_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive puppet_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppet_client_packets'($*)) dnl
+
+ corenet_send_puppet_client_packets($1)
+ corenet_receive_puppet_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive puppet_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppet_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_puppet_client_packets($1)
+ corenet_dontaudit_receive_puppet_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppet_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to puppet_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_puppet_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppet_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_client_packet_t;
+ ')
+
+ allow $1 puppet_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppet_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send puppet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_puppet_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_server_packet_t;
+ ')
+
+ allow $1 puppet_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send puppet_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppet_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_server_packet_t;
+ ')
+
+ dontaudit $1 puppet_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive puppet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_puppet_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_server_packet_t;
+ ')
+
+ allow $1 puppet_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive puppet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppet_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_server_packet_t;
+ ')
+
+ dontaudit $1 puppet_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive puppet_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppet_server_packets'($*)) dnl
+
+ corenet_send_puppet_server_packets($1)
+ corenet_receive_puppet_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive puppet_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppet_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_puppet_server_packets($1)
+ corenet_dontaudit_receive_puppet_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppet_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to puppet_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_puppet_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppet_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppet_server_packet_t;
+ ')
+
+ allow $1 puppet_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppet_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the puppetclient port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_puppetclient_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_puppetclient_port'($*)) dnl
+
+ gen_require(`
+ type puppetclient_port_t;
+ ')
+
+ allow $1 puppetclient_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_puppetclient_port'($*)) dnl
+
+ gen_require(`
+ type puppetclient_port_t;
+ ')
+
+ allow $1 puppetclient_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_puppetclient_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the puppetclient port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_puppetclient_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_puppetclient_port'($*)) dnl
+
+ gen_require(`
+ type puppetclient_port_t;
+ ')
+
+ allow $1 puppetclient_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_puppetclient_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send puppetclient_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_puppetclient_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_client_packet_t;
+ ')
+
+ allow $1 puppetclient_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send puppetclient_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppetclient_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_client_packet_t;
+ ')
+
+ dontaudit $1 puppetclient_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive puppetclient_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_puppetclient_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_client_packet_t;
+ ')
+
+ allow $1 puppetclient_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive puppetclient_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppetclient_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_client_packet_t;
+ ')
+
+ dontaudit $1 puppetclient_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive puppetclient_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppetclient_client_packets'($*)) dnl
+
+ corenet_send_puppetclient_client_packets($1)
+ corenet_receive_puppetclient_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive puppetclient_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppetclient_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_puppetclient_client_packets($1)
+ corenet_dontaudit_receive_puppetclient_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to puppetclient_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_puppetclient_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppetclient_client_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_client_packet_t;
+ ')
+
+ allow $1 puppetclient_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppetclient_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send puppetclient_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_puppetclient_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_server_packet_t;
+ ')
+
+ allow $1 puppetclient_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send puppetclient_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_puppetclient_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_server_packet_t;
+ ')
+
+ dontaudit $1 puppetclient_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive puppetclient_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_puppetclient_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_server_packet_t;
+ ')
+
+ allow $1 puppetclient_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive puppetclient_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_puppetclient_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_server_packet_t;
+ ')
+
+ dontaudit $1 puppetclient_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive puppetclient_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_puppetclient_server_packets'($*)) dnl
+
+ corenet_send_puppetclient_server_packets($1)
+ corenet_receive_puppetclient_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive puppetclient_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_puppetclient_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_puppetclient_server_packets($1)
+ corenet_dontaudit_receive_puppetclient_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to puppetclient_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_puppetclient_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_puppetclient_server_packets'($*)) dnl
+
+ gen_require(`
+ type puppetclient_server_packet_t;
+ ')
+
+ allow $1 puppetclient_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_puppetclient_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pxe port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pxe port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pxe port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pxe_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pxe_port'($*)) dnl
+
+ gen_require(`
+ type pxe_port_t;
+ ')
+
+ allow $1 pxe_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pxe_port'($*)) dnl
+
+ gen_require(`
+ type pxe_port_t;
+ ')
+
+ allow $1 pxe_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pxe_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pxe port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pxe_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pxe_port'($*)) dnl
+
+ gen_require(`
+ type pxe_port_t;
+ ')
+
+ allow $1 pxe_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pxe_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pxe_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pxe_client_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_client_packet_t;
+ ')
+
+ allow $1 pxe_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pxe_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pxe_client_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_client_packet_t;
+ ')
+
+ dontaudit $1 pxe_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pxe_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pxe_client_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_client_packet_t;
+ ')
+
+ allow $1 pxe_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pxe_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pxe_client_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_client_packet_t;
+ ')
+
+ dontaudit $1 pxe_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pxe_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pxe_client_packets'($*)) dnl
+
+ corenet_send_pxe_client_packets($1)
+ corenet_receive_pxe_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pxe_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pxe_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pxe_client_packets($1)
+ corenet_dontaudit_receive_pxe_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pxe_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pxe_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pxe_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pxe_client_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_client_packet_t;
+ ')
+
+ allow $1 pxe_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pxe_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pxe_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pxe_server_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_server_packet_t;
+ ')
+
+ allow $1 pxe_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pxe_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pxe_server_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_server_packet_t;
+ ')
+
+ dontaudit $1 pxe_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pxe_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pxe_server_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_server_packet_t;
+ ')
+
+ allow $1 pxe_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pxe_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pxe_server_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_server_packet_t;
+ ')
+
+ dontaudit $1 pxe_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pxe_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pxe_server_packets'($*)) dnl
+
+ corenet_send_pxe_server_packets($1)
+ corenet_receive_pxe_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pxe_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pxe_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pxe_server_packets($1)
+ corenet_dontaudit_receive_pxe_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pxe_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pxe_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pxe_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pxe_server_packets'($*)) dnl
+
+ gen_require(`
+ type pxe_server_packet_t;
+ ')
+
+ allow $1 pxe_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pxe_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the pyzor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the pyzor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the pyzor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_pyzor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_pyzor_port'($*)) dnl
+
+ gen_require(`
+ type pyzor_port_t;
+ ')
+
+ allow $1 pyzor_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_pyzor_port'($*)) dnl
+
+ gen_require(`
+ type pyzor_port_t;
+ ')
+
+ allow $1 pyzor_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_pyzor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the pyzor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_pyzor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_pyzor_port'($*)) dnl
+
+ gen_require(`
+ type pyzor_port_t;
+ ')
+
+ allow $1 pyzor_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_pyzor_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pyzor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pyzor_client_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_client_packet_t;
+ ')
+
+ allow $1 pyzor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pyzor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pyzor_client_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_client_packet_t;
+ ')
+
+ dontaudit $1 pyzor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pyzor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pyzor_client_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_client_packet_t;
+ ')
+
+ allow $1 pyzor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pyzor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pyzor_client_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_client_packet_t;
+ ')
+
+ dontaudit $1 pyzor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pyzor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pyzor_client_packets'($*)) dnl
+
+ corenet_send_pyzor_client_packets($1)
+ corenet_receive_pyzor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pyzor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pyzor_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_pyzor_client_packets($1)
+ corenet_dontaudit_receive_pyzor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pyzor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pyzor_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pyzor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pyzor_client_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_client_packet_t;
+ ')
+
+ allow $1 pyzor_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pyzor_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send pyzor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_pyzor_server_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_server_packet_t;
+ ')
+
+ allow $1 pyzor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send pyzor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_pyzor_server_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_server_packet_t;
+ ')
+
+ dontaudit $1 pyzor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive pyzor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_pyzor_server_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_server_packet_t;
+ ')
+
+ allow $1 pyzor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive pyzor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_pyzor_server_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_server_packet_t;
+ ')
+
+ dontaudit $1 pyzor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive pyzor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_pyzor_server_packets'($*)) dnl
+
+ corenet_send_pyzor_server_packets($1)
+ corenet_receive_pyzor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive pyzor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_pyzor_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_pyzor_server_packets($1)
+ corenet_dontaudit_receive_pyzor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_pyzor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to pyzor_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_pyzor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_pyzor_server_packets'($*)) dnl
+
+ gen_require(`
+ type pyzor_server_packet_t;
+ ')
+
+ allow $1 pyzor_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_pyzor_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the radacct port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the radacct port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the radacct port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radacct_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radacct_port'($*)) dnl
+
+ gen_require(`
+ type radacct_port_t;
+ ')
+
+ allow $1 radacct_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radacct_port'($*)) dnl
+
+ gen_require(`
+ type radacct_port_t;
+ ')
+
+ allow $1 radacct_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radacct_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the radacct port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_radacct_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radacct_port'($*)) dnl
+
+ gen_require(`
+ type radacct_port_t;
+ ')
+
+ allow $1 radacct_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radacct_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radacct_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radacct_client_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_client_packet_t;
+ ')
+
+ allow $1 radacct_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radacct_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radacct_client_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_client_packet_t;
+ ')
+
+ dontaudit $1 radacct_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radacct_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radacct_client_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_client_packet_t;
+ ')
+
+ allow $1 radacct_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radacct_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radacct_client_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_client_packet_t;
+ ')
+
+ dontaudit $1 radacct_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radacct_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radacct_client_packets'($*)) dnl
+
+ corenet_send_radacct_client_packets($1)
+ corenet_receive_radacct_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radacct_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radacct_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_radacct_client_packets($1)
+ corenet_dontaudit_receive_radacct_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radacct_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radacct_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radacct_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radacct_client_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_client_packet_t;
+ ')
+
+ allow $1 radacct_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radacct_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radacct_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radacct_server_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_server_packet_t;
+ ')
+
+ allow $1 radacct_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radacct_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radacct_server_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_server_packet_t;
+ ')
+
+ dontaudit $1 radacct_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radacct_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radacct_server_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_server_packet_t;
+ ')
+
+ allow $1 radacct_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radacct_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radacct_server_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_server_packet_t;
+ ')
+
+ dontaudit $1 radacct_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radacct_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radacct_server_packets'($*)) dnl
+
+ corenet_send_radacct_server_packets($1)
+ corenet_receive_radacct_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radacct_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radacct_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_radacct_server_packets($1)
+ corenet_dontaudit_receive_radacct_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radacct_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radacct_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radacct_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radacct_server_packets'($*)) dnl
+
+ gen_require(`
+ type radacct_server_packet_t;
+ ')
+
+ allow $1 radacct_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radacct_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the radius port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the radius port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the radius port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radius_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radius_port'($*)) dnl
+
+ gen_require(`
+ type radius_port_t;
+ ')
+
+ allow $1 radius_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radius_port'($*)) dnl
+
+ gen_require(`
+ type radius_port_t;
+ ')
+
+ allow $1 radius_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radius_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the radius port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_radius_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radius_port'($*)) dnl
+
+ gen_require(`
+ type radius_port_t;
+ ')
+
+ allow $1 radius_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radius_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radius_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radius_client_packets'($*)) dnl
+
+ gen_require(`
+ type radius_client_packet_t;
+ ')
+
+ allow $1 radius_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radius_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radius_client_packets'($*)) dnl
+
+ gen_require(`
+ type radius_client_packet_t;
+ ')
+
+ dontaudit $1 radius_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radius_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radius_client_packets'($*)) dnl
+
+ gen_require(`
+ type radius_client_packet_t;
+ ')
+
+ allow $1 radius_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radius_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radius_client_packets'($*)) dnl
+
+ gen_require(`
+ type radius_client_packet_t;
+ ')
+
+ dontaudit $1 radius_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radius_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radius_client_packets'($*)) dnl
+
+ corenet_send_radius_client_packets($1)
+ corenet_receive_radius_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radius_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radius_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_radius_client_packets($1)
+ corenet_dontaudit_receive_radius_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radius_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radius_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radius_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radius_client_packets'($*)) dnl
+
+ gen_require(`
+ type radius_client_packet_t;
+ ')
+
+ allow $1 radius_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radius_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radius_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radius_server_packets'($*)) dnl
+
+ gen_require(`
+ type radius_server_packet_t;
+ ')
+
+ allow $1 radius_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radius_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radius_server_packets'($*)) dnl
+
+ gen_require(`
+ type radius_server_packet_t;
+ ')
+
+ dontaudit $1 radius_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radius_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radius_server_packets'($*)) dnl
+
+ gen_require(`
+ type radius_server_packet_t;
+ ')
+
+ allow $1 radius_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radius_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radius_server_packets'($*)) dnl
+
+ gen_require(`
+ type radius_server_packet_t;
+ ')
+
+ dontaudit $1 radius_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radius_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radius_server_packets'($*)) dnl
+
+ corenet_send_radius_server_packets($1)
+ corenet_receive_radius_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radius_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radius_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_radius_server_packets($1)
+ corenet_dontaudit_receive_radius_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radius_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radius_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radius_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radius_server_packets'($*)) dnl
+
+ gen_require(`
+ type radius_server_packet_t;
+ ')
+
+ allow $1 radius_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radius_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the radsec port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the radsec port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the radsec port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_radsec_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_radsec_port'($*)) dnl
+
+ gen_require(`
+ type radsec_port_t;
+ ')
+
+ allow $1 radsec_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_radsec_port'($*)) dnl
+
+ gen_require(`
+ type radsec_port_t;
+ ')
+
+ allow $1 radsec_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_radsec_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the radsec port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_radsec_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_radsec_port'($*)) dnl
+
+ gen_require(`
+ type radsec_port_t;
+ ')
+
+ allow $1 radsec_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_radsec_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radsec_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radsec_client_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_client_packet_t;
+ ')
+
+ allow $1 radsec_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radsec_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radsec_client_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_client_packet_t;
+ ')
+
+ dontaudit $1 radsec_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radsec_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radsec_client_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_client_packet_t;
+ ')
+
+ allow $1 radsec_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radsec_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radsec_client_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_client_packet_t;
+ ')
+
+ dontaudit $1 radsec_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radsec_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radsec_client_packets'($*)) dnl
+
+ corenet_send_radsec_client_packets($1)
+ corenet_receive_radsec_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radsec_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radsec_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_radsec_client_packets($1)
+ corenet_dontaudit_receive_radsec_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radsec_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radsec_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radsec_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radsec_client_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_client_packet_t;
+ ')
+
+ allow $1 radsec_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radsec_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send radsec_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_radsec_server_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_server_packet_t;
+ ')
+
+ allow $1 radsec_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send radsec_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_radsec_server_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_server_packet_t;
+ ')
+
+ dontaudit $1 radsec_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive radsec_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_radsec_server_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_server_packet_t;
+ ')
+
+ allow $1 radsec_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive radsec_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_radsec_server_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_server_packet_t;
+ ')
+
+ dontaudit $1 radsec_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive radsec_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_radsec_server_packets'($*)) dnl
+
+ corenet_send_radsec_server_packets($1)
+ corenet_receive_radsec_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive radsec_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_radsec_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_radsec_server_packets($1)
+ corenet_dontaudit_receive_radsec_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_radsec_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to radsec_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_radsec_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_radsec_server_packets'($*)) dnl
+
+ gen_require(`
+ type radsec_server_packet_t;
+ ')
+
+ allow $1 radsec_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_radsec_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the razor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the razor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the razor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_razor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_razor_port'($*)) dnl
+
+ gen_require(`
+ type razor_port_t;
+ ')
+
+ allow $1 razor_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_razor_port'($*)) dnl
+
+ gen_require(`
+ type razor_port_t;
+ ')
+
+ allow $1 razor_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_razor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the razor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_razor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_razor_port'($*)) dnl
+
+ gen_require(`
+ type razor_port_t;
+ ')
+
+ allow $1 razor_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_razor_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send razor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_razor_client_packets'($*)) dnl
+
+ gen_require(`
+ type razor_client_packet_t;
+ ')
+
+ allow $1 razor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send razor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_razor_client_packets'($*)) dnl
+
+ gen_require(`
+ type razor_client_packet_t;
+ ')
+
+ dontaudit $1 razor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive razor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_razor_client_packets'($*)) dnl
+
+ gen_require(`
+ type razor_client_packet_t;
+ ')
+
+ allow $1 razor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive razor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_razor_client_packets'($*)) dnl
+
+ gen_require(`
+ type razor_client_packet_t;
+ ')
+
+ dontaudit $1 razor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive razor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_razor_client_packets'($*)) dnl
+
+ corenet_send_razor_client_packets($1)
+ corenet_receive_razor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive razor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_razor_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_razor_client_packets($1)
+ corenet_dontaudit_receive_razor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_razor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to razor_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_razor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_razor_client_packets'($*)) dnl
+
+ gen_require(`
+ type razor_client_packet_t;
+ ')
+
+ allow $1 razor_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_razor_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send razor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_razor_server_packets'($*)) dnl
+
+ gen_require(`
+ type razor_server_packet_t;
+ ')
+
+ allow $1 razor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send razor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_razor_server_packets'($*)) dnl
+
+ gen_require(`
+ type razor_server_packet_t;
+ ')
+
+ dontaudit $1 razor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive razor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_razor_server_packets'($*)) dnl
+
+ gen_require(`
+ type razor_server_packet_t;
+ ')
+
+ allow $1 razor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive razor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_razor_server_packets'($*)) dnl
+
+ gen_require(`
+ type razor_server_packet_t;
+ ')
+
+ dontaudit $1 razor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive razor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_razor_server_packets'($*)) dnl
+
+ corenet_send_razor_server_packets($1)
+ corenet_receive_razor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive razor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_razor_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_razor_server_packets($1)
+ corenet_dontaudit_receive_razor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_razor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to razor_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_razor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_razor_server_packets'($*)) dnl
+
+ gen_require(`
+ type razor_server_packet_t;
+ ')
+
+ allow $1 razor_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_razor_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the redis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the redis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the redis port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_redis_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_redis_port'($*)) dnl
+
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_redis_port'($*)) dnl
+
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_redis_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the redis port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_redis_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_redis_port'($*)) dnl
+
+ gen_require(`
+ type redis_port_t;
+ ')
+
+ allow $1 redis_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_redis_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send redis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_redis_client_packets'($*)) dnl
+
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send redis_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_redis_client_packets'($*)) dnl
+
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ dontaudit $1 redis_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive redis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_redis_client_packets'($*)) dnl
+
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive redis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_redis_client_packets'($*)) dnl
+
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ dontaudit $1 redis_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive redis_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_redis_client_packets'($*)) dnl
+
+ corenet_send_redis_client_packets($1)
+ corenet_receive_redis_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive redis_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_redis_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_redis_client_packets($1)
+ corenet_dontaudit_receive_redis_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_redis_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to redis_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_redis_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_redis_client_packets'($*)) dnl
+
+ gen_require(`
+ type redis_client_packet_t;
+ ')
+
+ allow $1 redis_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_redis_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send redis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_redis_server_packets'($*)) dnl
+
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send redis_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_redis_server_packets'($*)) dnl
+
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ dontaudit $1 redis_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive redis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_redis_server_packets'($*)) dnl
+
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive redis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_redis_server_packets'($*)) dnl
+
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ dontaudit $1 redis_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive redis_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_redis_server_packets'($*)) dnl
+
+ corenet_send_redis_server_packets($1)
+ corenet_receive_redis_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive redis_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_redis_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_redis_server_packets($1)
+ corenet_dontaudit_receive_redis_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_redis_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to redis_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_redis_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_redis_server_packets'($*)) dnl
+
+ gen_require(`
+ type redis_server_packet_t;
+ ')
+
+ allow $1 redis_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_redis_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the repository port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the repository port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the repository port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_repository_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_repository_port'($*)) dnl
+
+ gen_require(`
+ type repository_port_t;
+ ')
+
+ allow $1 repository_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_repository_port'($*)) dnl
+
+ gen_require(`
+ type repository_port_t;
+ ')
+
+ allow $1 repository_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_repository_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the repository port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_repository_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_repository_port'($*)) dnl
+
+ gen_require(`
+ type repository_port_t;
+ ')
+
+ allow $1 repository_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_repository_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send repository_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_repository_client_packets'($*)) dnl
+
+ gen_require(`
+ type repository_client_packet_t;
+ ')
+
+ allow $1 repository_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send repository_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_repository_client_packets'($*)) dnl
+
+ gen_require(`
+ type repository_client_packet_t;
+ ')
+
+ dontaudit $1 repository_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive repository_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_repository_client_packets'($*)) dnl
+
+ gen_require(`
+ type repository_client_packet_t;
+ ')
+
+ allow $1 repository_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive repository_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_repository_client_packets'($*)) dnl
+
+ gen_require(`
+ type repository_client_packet_t;
+ ')
+
+ dontaudit $1 repository_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive repository_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_repository_client_packets'($*)) dnl
+
+ corenet_send_repository_client_packets($1)
+ corenet_receive_repository_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive repository_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_repository_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_repository_client_packets($1)
+ corenet_dontaudit_receive_repository_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_repository_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to repository_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_repository_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_repository_client_packets'($*)) dnl
+
+ gen_require(`
+ type repository_client_packet_t;
+ ')
+
+ allow $1 repository_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_repository_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send repository_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_repository_server_packets'($*)) dnl
+
+ gen_require(`
+ type repository_server_packet_t;
+ ')
+
+ allow $1 repository_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send repository_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_repository_server_packets'($*)) dnl
+
+ gen_require(`
+ type repository_server_packet_t;
+ ')
+
+ dontaudit $1 repository_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive repository_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_repository_server_packets'($*)) dnl
+
+ gen_require(`
+ type repository_server_packet_t;
+ ')
+
+ allow $1 repository_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive repository_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_repository_server_packets'($*)) dnl
+
+ gen_require(`
+ type repository_server_packet_t;
+ ')
+
+ dontaudit $1 repository_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive repository_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_repository_server_packets'($*)) dnl
+
+ corenet_send_repository_server_packets($1)
+ corenet_receive_repository_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive repository_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_repository_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_repository_server_packets($1)
+ corenet_dontaudit_receive_repository_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_repository_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to repository_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_repository_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_repository_server_packets'($*)) dnl
+
+ gen_require(`
+ type repository_server_packet_t;
+ ')
+
+ allow $1 repository_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_repository_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ricci port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ricci port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ricci port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ricci_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ricci_port'($*)) dnl
+
+ gen_require(`
+ type ricci_port_t;
+ ')
+
+ allow $1 ricci_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ricci_port'($*)) dnl
+
+ gen_require(`
+ type ricci_port_t;
+ ')
+
+ allow $1 ricci_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ricci_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ricci port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ricci_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ricci_port'($*)) dnl
+
+ gen_require(`
+ type ricci_port_t;
+ ')
+
+ allow $1 ricci_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ricci_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ricci_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_client_packet_t;
+ ')
+
+ allow $1 ricci_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ricci_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_client_packet_t;
+ ')
+
+ dontaudit $1 ricci_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ricci_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_client_packet_t;
+ ')
+
+ allow $1 ricci_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ricci_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_client_packet_t;
+ ')
+
+ dontaudit $1 ricci_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ricci_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_client_packets'($*)) dnl
+
+ corenet_send_ricci_client_packets($1)
+ corenet_receive_ricci_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ricci_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ricci_client_packets($1)
+ corenet_dontaudit_receive_ricci_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ricci_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ricci_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_client_packet_t;
+ ')
+
+ allow $1 ricci_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ricci_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_server_packet_t;
+ ')
+
+ allow $1 ricci_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ricci_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_server_packet_t;
+ ')
+
+ dontaudit $1 ricci_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ricci_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_server_packet_t;
+ ')
+
+ allow $1 ricci_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ricci_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_server_packet_t;
+ ')
+
+ dontaudit $1 ricci_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ricci_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_server_packets'($*)) dnl
+
+ corenet_send_ricci_server_packets($1)
+ corenet_receive_ricci_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ricci_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ricci_server_packets($1)
+ corenet_dontaudit_receive_ricci_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ricci_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ricci_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_server_packet_t;
+ ')
+
+ allow $1 ricci_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ricci_modcluster port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ricci_modcluster_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ricci_modcluster_port'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_port_t;
+ ')
+
+ allow $1 ricci_modcluster_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ricci_modcluster_port'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_port_t;
+ ')
+
+ allow $1 ricci_modcluster_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ricci_modcluster port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ricci_modcluster_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ricci_modcluster_port'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_port_t;
+ ')
+
+ allow $1 ricci_modcluster_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ricci_modcluster_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ricci_modcluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_modcluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_client_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ricci_modcluster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_modcluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_client_packet_t;
+ ')
+
+ dontaudit $1 ricci_modcluster_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ricci_modcluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_modcluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_client_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ricci_modcluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_modcluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_client_packet_t;
+ ')
+
+ dontaudit $1 ricci_modcluster_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ricci_modcluster_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_modcluster_client_packets'($*)) dnl
+
+ corenet_send_ricci_modcluster_client_packets($1)
+ corenet_receive_ricci_modcluster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ricci_modcluster_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_modcluster_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ricci_modcluster_client_packets($1)
+ corenet_dontaudit_receive_ricci_modcluster_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ricci_modcluster_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ricci_modcluster_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_modcluster_client_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_client_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_modcluster_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ricci_modcluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ricci_modcluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_server_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ricci_modcluster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ricci_modcluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_server_packet_t;
+ ')
+
+ dontaudit $1 ricci_modcluster_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ricci_modcluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ricci_modcluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_server_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ricci_modcluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ricci_modcluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_server_packet_t;
+ ')
+
+ dontaudit $1 ricci_modcluster_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ricci_modcluster_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ricci_modcluster_server_packets'($*)) dnl
+
+ corenet_send_ricci_modcluster_server_packets($1)
+ corenet_receive_ricci_modcluster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ricci_modcluster_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ricci_modcluster_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ricci_modcluster_server_packets($1)
+ corenet_dontaudit_receive_ricci_modcluster_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ricci_modcluster_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ricci_modcluster_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ricci_modcluster_server_packets'($*)) dnl
+
+ gen_require(`
+ type ricci_modcluster_server_packet_t;
+ ')
+
+ allow $1 ricci_modcluster_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ricci_modcluster_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rlogind port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rlogind port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rlogind port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rlogind_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rlogind_port'($*)) dnl
+
+ gen_require(`
+ type rlogind_port_t;
+ ')
+
+ allow $1 rlogind_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rlogind_port'($*)) dnl
+
+ gen_require(`
+ type rlogind_port_t;
+ ')
+
+ allow $1 rlogind_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rlogind_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rlogind port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rlogind_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rlogind_port'($*)) dnl
+
+ gen_require(`
+ type rlogind_port_t;
+ ')
+
+ allow $1 rlogind_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rlogind_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rlogind_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rlogind_client_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_client_packet_t;
+ ')
+
+ allow $1 rlogind_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rlogind_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rlogind_client_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_client_packet_t;
+ ')
+
+ dontaudit $1 rlogind_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rlogind_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rlogind_client_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_client_packet_t;
+ ')
+
+ allow $1 rlogind_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rlogind_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rlogind_client_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_client_packet_t;
+ ')
+
+ dontaudit $1 rlogind_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rlogind_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rlogind_client_packets'($*)) dnl
+
+ corenet_send_rlogind_client_packets($1)
+ corenet_receive_rlogind_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rlogind_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rlogind_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rlogind_client_packets($1)
+ corenet_dontaudit_receive_rlogind_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rlogind_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rlogind_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rlogind_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rlogind_client_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_client_packet_t;
+ ')
+
+ allow $1 rlogind_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rlogind_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rlogind_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rlogind_server_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_server_packet_t;
+ ')
+
+ allow $1 rlogind_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rlogind_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rlogind_server_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_server_packet_t;
+ ')
+
+ dontaudit $1 rlogind_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rlogind_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rlogind_server_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_server_packet_t;
+ ')
+
+ allow $1 rlogind_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rlogind_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rlogind_server_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_server_packet_t;
+ ')
+
+ dontaudit $1 rlogind_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rlogind_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rlogind_server_packets'($*)) dnl
+
+ corenet_send_rlogind_server_packets($1)
+ corenet_receive_rlogind_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rlogind_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rlogind_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rlogind_server_packets($1)
+ corenet_dontaudit_receive_rlogind_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rlogind_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rlogind_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rlogind_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rlogind_server_packets'($*)) dnl
+
+ gen_require(`
+ type rlogind_server_packet_t;
+ ')
+
+ allow $1 rlogind_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rlogind_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rndc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rndc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rndc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rndc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rndc_port'($*)) dnl
+
+ gen_require(`
+ type rndc_port_t;
+ ')
+
+ allow $1 rndc_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rndc_port'($*)) dnl
+
+ gen_require(`
+ type rndc_port_t;
+ ')
+
+ allow $1 rndc_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rndc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rndc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rndc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rndc_port'($*)) dnl
+
+ gen_require(`
+ type rndc_port_t;
+ ')
+
+ allow $1 rndc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rndc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rndc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rndc_client_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_client_packet_t;
+ ')
+
+ allow $1 rndc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rndc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rndc_client_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_client_packet_t;
+ ')
+
+ dontaudit $1 rndc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rndc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rndc_client_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_client_packet_t;
+ ')
+
+ allow $1 rndc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rndc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rndc_client_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_client_packet_t;
+ ')
+
+ dontaudit $1 rndc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rndc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rndc_client_packets'($*)) dnl
+
+ corenet_send_rndc_client_packets($1)
+ corenet_receive_rndc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rndc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rndc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rndc_client_packets($1)
+ corenet_dontaudit_receive_rndc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rndc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rndc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rndc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rndc_client_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_client_packet_t;
+ ')
+
+ allow $1 rndc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rndc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rndc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rndc_server_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_server_packet_t;
+ ')
+
+ allow $1 rndc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rndc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rndc_server_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_server_packet_t;
+ ')
+
+ dontaudit $1 rndc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rndc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rndc_server_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_server_packet_t;
+ ')
+
+ allow $1 rndc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rndc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rndc_server_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_server_packet_t;
+ ')
+
+ dontaudit $1 rndc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rndc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rndc_server_packets'($*)) dnl
+
+ corenet_send_rndc_server_packets($1)
+ corenet_receive_rndc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rndc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rndc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rndc_server_packets($1)
+ corenet_dontaudit_receive_rndc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rndc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rndc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rndc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rndc_server_packets'($*)) dnl
+
+ gen_require(`
+ type rndc_server_packet_t;
+ ')
+
+ allow $1 rndc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rndc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the router port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the router port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the router port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_router_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_router_port'($*)) dnl
+
+ gen_require(`
+ type router_port_t;
+ ')
+
+ allow $1 router_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_router_port'($*)) dnl
+
+ gen_require(`
+ type router_port_t;
+ ')
+
+ allow $1 router_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_router_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the router port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_router_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_router_port'($*)) dnl
+
+ gen_require(`
+ type router_port_t;
+ ')
+
+ allow $1 router_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_router_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send router_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_router_client_packets'($*)) dnl
+
+ gen_require(`
+ type router_client_packet_t;
+ ')
+
+ allow $1 router_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send router_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_router_client_packets'($*)) dnl
+
+ gen_require(`
+ type router_client_packet_t;
+ ')
+
+ dontaudit $1 router_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive router_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_router_client_packets'($*)) dnl
+
+ gen_require(`
+ type router_client_packet_t;
+ ')
+
+ allow $1 router_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive router_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_router_client_packets'($*)) dnl
+
+ gen_require(`
+ type router_client_packet_t;
+ ')
+
+ dontaudit $1 router_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive router_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_router_client_packets'($*)) dnl
+
+ corenet_send_router_client_packets($1)
+ corenet_receive_router_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive router_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_router_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_router_client_packets($1)
+ corenet_dontaudit_receive_router_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_router_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to router_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_router_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_router_client_packets'($*)) dnl
+
+ gen_require(`
+ type router_client_packet_t;
+ ')
+
+ allow $1 router_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_router_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send router_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_router_server_packets'($*)) dnl
+
+ gen_require(`
+ type router_server_packet_t;
+ ')
+
+ allow $1 router_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send router_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_router_server_packets'($*)) dnl
+
+ gen_require(`
+ type router_server_packet_t;
+ ')
+
+ dontaudit $1 router_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive router_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_router_server_packets'($*)) dnl
+
+ gen_require(`
+ type router_server_packet_t;
+ ')
+
+ allow $1 router_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive router_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_router_server_packets'($*)) dnl
+
+ gen_require(`
+ type router_server_packet_t;
+ ')
+
+ dontaudit $1 router_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive router_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_router_server_packets'($*)) dnl
+
+ corenet_send_router_server_packets($1)
+ corenet_receive_router_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive router_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_router_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_router_server_packets($1)
+ corenet_dontaudit_receive_router_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_router_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to router_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_router_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_router_server_packets'($*)) dnl
+
+ gen_require(`
+ type router_server_packet_t;
+ ')
+
+ allow $1 router_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_router_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rsh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rsh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rsh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rsh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rsh_port'($*)) dnl
+
+ gen_require(`
+ type rsh_port_t;
+ ')
+
+ allow $1 rsh_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rsh_port'($*)) dnl
+
+ gen_require(`
+ type rsh_port_t;
+ ')
+
+ allow $1 rsh_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rsh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rsh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rsh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rsh_port'($*)) dnl
+
+ gen_require(`
+ type rsh_port_t;
+ ')
+
+ allow $1 rsh_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rsh_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rsh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rsh_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_client_packet_t;
+ ')
+
+ allow $1 rsh_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rsh_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsh_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_client_packet_t;
+ ')
+
+ dontaudit $1 rsh_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rsh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rsh_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_client_packet_t;
+ ')
+
+ allow $1 rsh_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rsh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsh_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_client_packet_t;
+ ')
+
+ dontaudit $1 rsh_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rsh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsh_client_packets'($*)) dnl
+
+ corenet_send_rsh_client_packets($1)
+ corenet_receive_rsh_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rsh_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsh_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rsh_client_packets($1)
+ corenet_dontaudit_receive_rsh_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rsh_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rsh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsh_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_client_packet_t;
+ ')
+
+ allow $1 rsh_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsh_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rsh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rsh_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_server_packet_t;
+ ')
+
+ allow $1 rsh_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rsh_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsh_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_server_packet_t;
+ ')
+
+ dontaudit $1 rsh_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rsh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rsh_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_server_packet_t;
+ ')
+
+ allow $1 rsh_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rsh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsh_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_server_packet_t;
+ ')
+
+ dontaudit $1 rsh_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rsh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsh_server_packets'($*)) dnl
+
+ corenet_send_rsh_server_packets($1)
+ corenet_receive_rsh_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rsh_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsh_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rsh_server_packets($1)
+ corenet_dontaudit_receive_rsh_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rsh_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rsh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsh_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsh_server_packet_t;
+ ')
+
+ allow $1 rsh_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsh_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rsync port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rsync port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rsync port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rsync_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rsync_port'($*)) dnl
+
+ gen_require(`
+ type rsync_port_t;
+ ')
+
+ allow $1 rsync_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rsync_port'($*)) dnl
+
+ gen_require(`
+ type rsync_port_t;
+ ')
+
+ allow $1 rsync_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rsync_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rsync port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rsync_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rsync_port'($*)) dnl
+
+ gen_require(`
+ type rsync_port_t;
+ ')
+
+ allow $1 rsync_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rsync_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rsync_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rsync_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_client_packet_t;
+ ')
+
+ allow $1 rsync_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rsync_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsync_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_client_packet_t;
+ ')
+
+ dontaudit $1 rsync_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rsync_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rsync_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_client_packet_t;
+ ')
+
+ allow $1 rsync_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rsync_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsync_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_client_packet_t;
+ ')
+
+ dontaudit $1 rsync_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rsync_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsync_client_packets'($*)) dnl
+
+ corenet_send_rsync_client_packets($1)
+ corenet_receive_rsync_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rsync_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsync_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rsync_client_packets($1)
+ corenet_dontaudit_receive_rsync_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsync_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rsync_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rsync_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsync_client_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_client_packet_t;
+ ')
+
+ allow $1 rsync_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsync_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rsync_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rsync_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_server_packet_t;
+ ')
+
+ allow $1 rsync_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rsync_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rsync_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_server_packet_t;
+ ')
+
+ dontaudit $1 rsync_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rsync_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rsync_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_server_packet_t;
+ ')
+
+ allow $1 rsync_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rsync_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rsync_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_server_packet_t;
+ ')
+
+ dontaudit $1 rsync_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rsync_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rsync_server_packets'($*)) dnl
+
+ corenet_send_rsync_server_packets($1)
+ corenet_receive_rsync_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rsync_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rsync_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rsync_server_packets($1)
+ corenet_dontaudit_receive_rsync_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rsync_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rsync_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rsync_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rsync_server_packets'($*)) dnl
+
+ gen_require(`
+ type rsync_server_packet_t;
+ ')
+
+ allow $1 rsync_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rsync_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rtorrent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rtorrent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rtorrent_port'($*)) dnl
+
+ gen_require(`
+ type rtorrent_port_t;
+ ')
+
+ allow $1 rtorrent_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rtorrent_port'($*)) dnl
+
+ gen_require(`
+ type rtorrent_port_t;
+ ')
+
+ allow $1 rtorrent_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rtorrent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rtorrent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rtorrent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rtorrent_port'($*)) dnl
+
+ gen_require(`
+ type rtorrent_port_t;
+ ')
+
+ allow $1 rtorrent_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rtorrent_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rtorrent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rtorrent_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_client_packet_t;
+ ')
+
+ allow $1 rtorrent_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rtorrent_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtorrent_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_client_packet_t;
+ ')
+
+ dontaudit $1 rtorrent_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rtorrent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rtorrent_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_client_packet_t;
+ ')
+
+ allow $1 rtorrent_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rtorrent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtorrent_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_client_packet_t;
+ ')
+
+ dontaudit $1 rtorrent_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rtorrent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtorrent_client_packets'($*)) dnl
+
+ corenet_send_rtorrent_client_packets($1)
+ corenet_receive_rtorrent_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rtorrent_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtorrent_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rtorrent_client_packets($1)
+ corenet_dontaudit_receive_rtorrent_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rtorrent_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rtorrent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtorrent_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_client_packet_t;
+ ')
+
+ allow $1 rtorrent_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtorrent_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rtorrent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rtorrent_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_server_packet_t;
+ ')
+
+ allow $1 rtorrent_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rtorrent_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtorrent_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_server_packet_t;
+ ')
+
+ dontaudit $1 rtorrent_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rtorrent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rtorrent_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_server_packet_t;
+ ')
+
+ allow $1 rtorrent_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rtorrent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtorrent_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_server_packet_t;
+ ')
+
+ dontaudit $1 rtorrent_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rtorrent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtorrent_server_packets'($*)) dnl
+
+ corenet_send_rtorrent_server_packets($1)
+ corenet_receive_rtorrent_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rtorrent_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtorrent_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rtorrent_server_packets($1)
+ corenet_dontaudit_receive_rtorrent_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rtorrent_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rtorrent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtorrent_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtorrent_server_packet_t;
+ ')
+
+ allow $1 rtorrent_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtorrent_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rtsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rtsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rtsp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rtsp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rtsp_port'($*)) dnl
+
+ gen_require(`
+ type rtsp_port_t;
+ ')
+
+ allow $1 rtsp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rtsp_port'($*)) dnl
+
+ gen_require(`
+ type rtsp_port_t;
+ ')
+
+ allow $1 rtsp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rtsp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rtsp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rtsp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rtsp_port'($*)) dnl
+
+ gen_require(`
+ type rtsp_port_t;
+ ')
+
+ allow $1 rtsp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rtsp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rtsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rtsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_client_packet_t;
+ ')
+
+ allow $1 rtsp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rtsp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_client_packet_t;
+ ')
+
+ dontaudit $1 rtsp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rtsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rtsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_client_packet_t;
+ ')
+
+ allow $1 rtsp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rtsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_client_packet_t;
+ ')
+
+ dontaudit $1 rtsp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rtsp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtsp_client_packets'($*)) dnl
+
+ corenet_send_rtsp_client_packets($1)
+ corenet_receive_rtsp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rtsp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtsp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rtsp_client_packets($1)
+ corenet_dontaudit_receive_rtsp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtsp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rtsp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rtsp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtsp_client_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_client_packet_t;
+ ')
+
+ allow $1 rtsp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtsp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rtsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rtsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_server_packet_t;
+ ')
+
+ allow $1 rtsp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rtsp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rtsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_server_packet_t;
+ ')
+
+ dontaudit $1 rtsp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rtsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rtsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_server_packet_t;
+ ')
+
+ allow $1 rtsp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rtsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rtsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_server_packet_t;
+ ')
+
+ dontaudit $1 rtsp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rtsp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rtsp_server_packets'($*)) dnl
+
+ corenet_send_rtsp_server_packets($1)
+ corenet_receive_rtsp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rtsp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rtsp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rtsp_server_packets($1)
+ corenet_dontaudit_receive_rtsp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rtsp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rtsp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rtsp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rtsp_server_packets'($*)) dnl
+
+ gen_require(`
+ type rtsp_server_packet_t;
+ ')
+
+ allow $1 rtsp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rtsp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the rwho port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the rwho port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the rwho port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_rwho_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_rwho_port'($*)) dnl
+
+ gen_require(`
+ type rwho_port_t;
+ ')
+
+ allow $1 rwho_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_rwho_port'($*)) dnl
+
+ gen_require(`
+ type rwho_port_t;
+ ')
+
+ allow $1 rwho_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_rwho_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the rwho port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_rwho_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_rwho_port'($*)) dnl
+
+ gen_require(`
+ type rwho_port_t;
+ ')
+
+ allow $1 rwho_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_rwho_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rwho_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rwho_client_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_client_packet_t;
+ ')
+
+ allow $1 rwho_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rwho_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rwho_client_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_client_packet_t;
+ ')
+
+ dontaudit $1 rwho_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rwho_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rwho_client_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_client_packet_t;
+ ')
+
+ allow $1 rwho_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rwho_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rwho_client_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_client_packet_t;
+ ')
+
+ dontaudit $1 rwho_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rwho_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rwho_client_packets'($*)) dnl
+
+ corenet_send_rwho_client_packets($1)
+ corenet_receive_rwho_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rwho_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rwho_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_rwho_client_packets($1)
+ corenet_dontaudit_receive_rwho_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rwho_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rwho_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rwho_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rwho_client_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_client_packet_t;
+ ')
+
+ allow $1 rwho_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rwho_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send rwho_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_rwho_server_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_server_packet_t;
+ ')
+
+ allow $1 rwho_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send rwho_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_rwho_server_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_server_packet_t;
+ ')
+
+ dontaudit $1 rwho_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive rwho_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_rwho_server_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_server_packet_t;
+ ')
+
+ allow $1 rwho_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive rwho_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_rwho_server_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_server_packet_t;
+ ')
+
+ dontaudit $1 rwho_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive rwho_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_rwho_server_packets'($*)) dnl
+
+ corenet_send_rwho_server_packets($1)
+ corenet_receive_rwho_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive rwho_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_rwho_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_rwho_server_packets($1)
+ corenet_dontaudit_receive_rwho_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_rwho_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to rwho_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_rwho_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_rwho_server_packets'($*)) dnl
+
+ gen_require(`
+ type rwho_server_packet_t;
+ ')
+
+ allow $1 rwho_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_rwho_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the salt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the salt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the salt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_salt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_salt_port'($*)) dnl
+
+ gen_require(`
+ type salt_port_t;
+ ')
+
+ allow $1 salt_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_salt_port'($*)) dnl
+
+ gen_require(`
+ type salt_port_t;
+ ')
+
+ allow $1 salt_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_salt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the salt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_salt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_salt_port'($*)) dnl
+
+ gen_require(`
+ type salt_port_t;
+ ')
+
+ allow $1 salt_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_salt_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send salt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_salt_client_packets'($*)) dnl
+
+ gen_require(`
+ type salt_client_packet_t;
+ ')
+
+ allow $1 salt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send salt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_salt_client_packets'($*)) dnl
+
+ gen_require(`
+ type salt_client_packet_t;
+ ')
+
+ dontaudit $1 salt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive salt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_salt_client_packets'($*)) dnl
+
+ gen_require(`
+ type salt_client_packet_t;
+ ')
+
+ allow $1 salt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive salt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_salt_client_packets'($*)) dnl
+
+ gen_require(`
+ type salt_client_packet_t;
+ ')
+
+ dontaudit $1 salt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive salt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_salt_client_packets'($*)) dnl
+
+ corenet_send_salt_client_packets($1)
+ corenet_receive_salt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive salt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_salt_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_salt_client_packets($1)
+ corenet_dontaudit_receive_salt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_salt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to salt_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_salt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_salt_client_packets'($*)) dnl
+
+ gen_require(`
+ type salt_client_packet_t;
+ ')
+
+ allow $1 salt_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_salt_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send salt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_salt_server_packets'($*)) dnl
+
+ gen_require(`
+ type salt_server_packet_t;
+ ')
+
+ allow $1 salt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send salt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_salt_server_packets'($*)) dnl
+
+ gen_require(`
+ type salt_server_packet_t;
+ ')
+
+ dontaudit $1 salt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive salt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_salt_server_packets'($*)) dnl
+
+ gen_require(`
+ type salt_server_packet_t;
+ ')
+
+ allow $1 salt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive salt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_salt_server_packets'($*)) dnl
+
+ gen_require(`
+ type salt_server_packet_t;
+ ')
+
+ dontaudit $1 salt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive salt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_salt_server_packets'($*)) dnl
+
+ corenet_send_salt_server_packets($1)
+ corenet_receive_salt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive salt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_salt_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_salt_server_packets($1)
+ corenet_dontaudit_receive_salt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_salt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to salt_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_salt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_salt_server_packets'($*)) dnl
+
+ gen_require(`
+ type salt_server_packet_t;
+ ')
+
+ allow $1 salt_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_salt_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the sap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the sap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the sap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sap_port'($*)) dnl
+
+ gen_require(`
+ type sap_port_t;
+ ')
+
+ allow $1 sap_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sap_port'($*)) dnl
+
+ gen_require(`
+ type sap_port_t;
+ ')
+
+ allow $1 sap_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the sap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_sap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sap_port'($*)) dnl
+
+ gen_require(`
+ type sap_port_t;
+ ')
+
+ allow $1 sap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sap_client_packets'($*)) dnl
+
+ gen_require(`
+ type sap_client_packet_t;
+ ')
+
+ allow $1 sap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sap_client_packets'($*)) dnl
+
+ gen_require(`
+ type sap_client_packet_t;
+ ')
+
+ dontaudit $1 sap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sap_client_packets'($*)) dnl
+
+ gen_require(`
+ type sap_client_packet_t;
+ ')
+
+ allow $1 sap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sap_client_packets'($*)) dnl
+
+ gen_require(`
+ type sap_client_packet_t;
+ ')
+
+ dontaudit $1 sap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sap_client_packets'($*)) dnl
+
+ corenet_send_sap_client_packets($1)
+ corenet_receive_sap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_sap_client_packets($1)
+ corenet_dontaudit_receive_sap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sap_client_packets'($*)) dnl
+
+ gen_require(`
+ type sap_client_packet_t;
+ ')
+
+ allow $1 sap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sap_server_packets'($*)) dnl
+
+ gen_require(`
+ type sap_server_packet_t;
+ ')
+
+ allow $1 sap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sap_server_packets'($*)) dnl
+
+ gen_require(`
+ type sap_server_packet_t;
+ ')
+
+ dontaudit $1 sap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sap_server_packets'($*)) dnl
+
+ gen_require(`
+ type sap_server_packet_t;
+ ')
+
+ allow $1 sap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sap_server_packets'($*)) dnl
+
+ gen_require(`
+ type sap_server_packet_t;
+ ')
+
+ dontaudit $1 sap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sap_server_packets'($*)) dnl
+
+ corenet_send_sap_server_packets($1)
+ corenet_receive_sap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_sap_server_packets($1)
+ corenet_dontaudit_receive_sap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sap_server_packets'($*)) dnl
+
+ gen_require(`
+ type sap_server_packet_t;
+ ')
+
+ allow $1 sap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the servistaitsm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_servistaitsm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_servistaitsm_port'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_port_t;
+ ')
+
+ allow $1 servistaitsm_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_servistaitsm_port'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_port_t;
+ ')
+
+ allow $1 servistaitsm_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_servistaitsm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the servistaitsm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_servistaitsm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_servistaitsm_port'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_port_t;
+ ')
+
+ allow $1 servistaitsm_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_servistaitsm_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send servistaitsm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_servistaitsm_client_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_client_packet_t;
+ ')
+
+ allow $1 servistaitsm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send servistaitsm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_servistaitsm_client_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_client_packet_t;
+ ')
+
+ dontaudit $1 servistaitsm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive servistaitsm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_servistaitsm_client_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_client_packet_t;
+ ')
+
+ allow $1 servistaitsm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive servistaitsm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_servistaitsm_client_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_client_packet_t;
+ ')
+
+ dontaudit $1 servistaitsm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive servistaitsm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_servistaitsm_client_packets'($*)) dnl
+
+ corenet_send_servistaitsm_client_packets($1)
+ corenet_receive_servistaitsm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive servistaitsm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_servistaitsm_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_servistaitsm_client_packets($1)
+ corenet_dontaudit_receive_servistaitsm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to servistaitsm_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_servistaitsm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_servistaitsm_client_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_client_packet_t;
+ ')
+
+ allow $1 servistaitsm_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_servistaitsm_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send servistaitsm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_servistaitsm_server_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_server_packet_t;
+ ')
+
+ allow $1 servistaitsm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send servistaitsm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_servistaitsm_server_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_server_packet_t;
+ ')
+
+ dontaudit $1 servistaitsm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive servistaitsm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_servistaitsm_server_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_server_packet_t;
+ ')
+
+ allow $1 servistaitsm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive servistaitsm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_servistaitsm_server_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_server_packet_t;
+ ')
+
+ dontaudit $1 servistaitsm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive servistaitsm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_servistaitsm_server_packets'($*)) dnl
+
+ corenet_send_servistaitsm_server_packets($1)
+ corenet_receive_servistaitsm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive servistaitsm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_servistaitsm_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_servistaitsm_server_packets($1)
+ corenet_dontaudit_receive_servistaitsm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to servistaitsm_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_servistaitsm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_servistaitsm_server_packets'($*)) dnl
+
+ gen_require(`
+ type servistaitsm_server_packet_t;
+ ')
+
+ allow $1 servistaitsm_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_servistaitsm_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the sieve port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the sieve port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the sieve port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sieve_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sieve_port'($*)) dnl
+
+ gen_require(`
+ type sieve_port_t;
+ ')
+
+ allow $1 sieve_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sieve_port'($*)) dnl
+
+ gen_require(`
+ type sieve_port_t;
+ ')
+
+ allow $1 sieve_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sieve_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the sieve port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_sieve_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sieve_port'($*)) dnl
+
+ gen_require(`
+ type sieve_port_t;
+ ')
+
+ allow $1 sieve_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sieve_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sieve_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sieve_client_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_client_packet_t;
+ ')
+
+ allow $1 sieve_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sieve_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sieve_client_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_client_packet_t;
+ ')
+
+ dontaudit $1 sieve_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sieve_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sieve_client_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_client_packet_t;
+ ')
+
+ allow $1 sieve_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sieve_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sieve_client_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_client_packet_t;
+ ')
+
+ dontaudit $1 sieve_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sieve_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sieve_client_packets'($*)) dnl
+
+ corenet_send_sieve_client_packets($1)
+ corenet_receive_sieve_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sieve_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sieve_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_sieve_client_packets($1)
+ corenet_dontaudit_receive_sieve_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sieve_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sieve_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sieve_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sieve_client_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_client_packet_t;
+ ')
+
+ allow $1 sieve_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sieve_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sieve_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sieve_server_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_server_packet_t;
+ ')
+
+ allow $1 sieve_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sieve_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sieve_server_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_server_packet_t;
+ ')
+
+ dontaudit $1 sieve_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sieve_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sieve_server_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_server_packet_t;
+ ')
+
+ allow $1 sieve_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sieve_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sieve_server_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_server_packet_t;
+ ')
+
+ dontaudit $1 sieve_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sieve_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sieve_server_packets'($*)) dnl
+
+ corenet_send_sieve_server_packets($1)
+ corenet_receive_sieve_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sieve_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sieve_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_sieve_server_packets($1)
+ corenet_dontaudit_receive_sieve_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sieve_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sieve_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sieve_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sieve_server_packets'($*)) dnl
+
+ gen_require(`
+ type sieve_server_packet_t;
+ ')
+
+ allow $1 sieve_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sieve_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the sip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the sip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the sip port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sip_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sip_port'($*)) dnl
+
+ gen_require(`
+ type sip_port_t;
+ ')
+
+ allow $1 sip_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sip_port'($*)) dnl
+
+ gen_require(`
+ type sip_port_t;
+ ')
+
+ allow $1 sip_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sip_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the sip port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_sip_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sip_port'($*)) dnl
+
+ gen_require(`
+ type sip_port_t;
+ ')
+
+ allow $1 sip_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sip_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sip_client_packets'($*)) dnl
+
+ gen_require(`
+ type sip_client_packet_t;
+ ')
+
+ allow $1 sip_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sip_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sip_client_packets'($*)) dnl
+
+ gen_require(`
+ type sip_client_packet_t;
+ ')
+
+ dontaudit $1 sip_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sip_client_packets'($*)) dnl
+
+ gen_require(`
+ type sip_client_packet_t;
+ ')
+
+ allow $1 sip_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sip_client_packets'($*)) dnl
+
+ gen_require(`
+ type sip_client_packet_t;
+ ')
+
+ dontaudit $1 sip_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sip_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sip_client_packets'($*)) dnl
+
+ corenet_send_sip_client_packets($1)
+ corenet_receive_sip_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sip_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sip_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_sip_client_packets($1)
+ corenet_dontaudit_receive_sip_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sip_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sip_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sip_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sip_client_packets'($*)) dnl
+
+ gen_require(`
+ type sip_client_packet_t;
+ ')
+
+ allow $1 sip_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sip_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sip_server_packets'($*)) dnl
+
+ gen_require(`
+ type sip_server_packet_t;
+ ')
+
+ allow $1 sip_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sip_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sip_server_packets'($*)) dnl
+
+ gen_require(`
+ type sip_server_packet_t;
+ ')
+
+ dontaudit $1 sip_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sip_server_packets'($*)) dnl
+
+ gen_require(`
+ type sip_server_packet_t;
+ ')
+
+ allow $1 sip_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sip_server_packets'($*)) dnl
+
+ gen_require(`
+ type sip_server_packet_t;
+ ')
+
+ dontaudit $1 sip_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sip_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sip_server_packets'($*)) dnl
+
+ corenet_send_sip_server_packets($1)
+ corenet_receive_sip_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sip_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sip_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_sip_server_packets($1)
+ corenet_dontaudit_receive_sip_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sip_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sip_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sip_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sip_server_packets'($*)) dnl
+
+ gen_require(`
+ type sip_server_packet_t;
+ ')
+
+ allow $1 sip_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sip_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the sixxsconfig port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sixxsconfig_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sixxsconfig_port'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_port_t;
+ ')
+
+ allow $1 sixxsconfig_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sixxsconfig_port'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_port_t;
+ ')
+
+ allow $1 sixxsconfig_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sixxsconfig_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the sixxsconfig port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_sixxsconfig_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sixxsconfig_port'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_port_t;
+ ')
+
+ allow $1 sixxsconfig_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sixxsconfig_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sixxsconfig_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sixxsconfig_client_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_client_packet_t;
+ ')
+
+ allow $1 sixxsconfig_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sixxsconfig_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sixxsconfig_client_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_client_packet_t;
+ ')
+
+ dontaudit $1 sixxsconfig_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sixxsconfig_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sixxsconfig_client_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_client_packet_t;
+ ')
+
+ allow $1 sixxsconfig_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sixxsconfig_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sixxsconfig_client_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_client_packet_t;
+ ')
+
+ dontaudit $1 sixxsconfig_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sixxsconfig_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sixxsconfig_client_packets'($*)) dnl
+
+ corenet_send_sixxsconfig_client_packets($1)
+ corenet_receive_sixxsconfig_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sixxsconfig_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sixxsconfig_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_sixxsconfig_client_packets($1)
+ corenet_dontaudit_receive_sixxsconfig_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sixxsconfig_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sixxsconfig_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sixxsconfig_client_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_client_packet_t;
+ ')
+
+ allow $1 sixxsconfig_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sixxsconfig_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sixxsconfig_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sixxsconfig_server_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_server_packet_t;
+ ')
+
+ allow $1 sixxsconfig_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sixxsconfig_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sixxsconfig_server_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_server_packet_t;
+ ')
+
+ dontaudit $1 sixxsconfig_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sixxsconfig_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sixxsconfig_server_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_server_packet_t;
+ ')
+
+ allow $1 sixxsconfig_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sixxsconfig_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sixxsconfig_server_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_server_packet_t;
+ ')
+
+ dontaudit $1 sixxsconfig_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sixxsconfig_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sixxsconfig_server_packets'($*)) dnl
+
+ corenet_send_sixxsconfig_server_packets($1)
+ corenet_receive_sixxsconfig_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sixxsconfig_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sixxsconfig_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_sixxsconfig_server_packets($1)
+ corenet_dontaudit_receive_sixxsconfig_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sixxsconfig_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sixxsconfig_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sixxsconfig_server_packets'($*)) dnl
+
+ gen_require(`
+ type sixxsconfig_server_packet_t;
+ ')
+
+ allow $1 sixxsconfig_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sixxsconfig_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the smbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the smbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the smbd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_smbd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_smbd_port'($*)) dnl
+
+ gen_require(`
+ type smbd_port_t;
+ ')
+
+ allow $1 smbd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_smbd_port'($*)) dnl
+
+ gen_require(`
+ type smbd_port_t;
+ ')
+
+ allow $1 smbd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_smbd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the smbd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_smbd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_smbd_port'($*)) dnl
+
+ gen_require(`
+ type smbd_port_t;
+ ')
+
+ allow $1 smbd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_smbd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send smbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_smbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_client_packet_t;
+ ')
+
+ allow $1 smbd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send smbd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_client_packet_t;
+ ')
+
+ dontaudit $1 smbd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive smbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_smbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_client_packet_t;
+ ')
+
+ allow $1 smbd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive smbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_client_packet_t;
+ ')
+
+ dontaudit $1 smbd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive smbd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smbd_client_packets'($*)) dnl
+
+ corenet_send_smbd_client_packets($1)
+ corenet_receive_smbd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive smbd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smbd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_smbd_client_packets($1)
+ corenet_dontaudit_receive_smbd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smbd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to smbd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_smbd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smbd_client_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_client_packet_t;
+ ')
+
+ allow $1 smbd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_smbd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send smbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_smbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_server_packet_t;
+ ')
+
+ allow $1 smbd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send smbd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_server_packet_t;
+ ')
+
+ dontaudit $1 smbd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive smbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_smbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_server_packet_t;
+ ')
+
+ allow $1 smbd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive smbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_server_packet_t;
+ ')
+
+ dontaudit $1 smbd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive smbd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smbd_server_packets'($*)) dnl
+
+ corenet_send_smbd_server_packets($1)
+ corenet_receive_smbd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive smbd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smbd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_smbd_server_packets($1)
+ corenet_dontaudit_receive_smbd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smbd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to smbd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_smbd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smbd_server_packets'($*)) dnl
+
+ gen_require(`
+ type smbd_server_packet_t;
+ ')
+
+ allow $1 smbd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_smbd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the smtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the smtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the smtp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_smtp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_smtp_port'($*)) dnl
+
+ gen_require(`
+ type smtp_port_t;
+ ')
+
+ allow $1 smtp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_smtp_port'($*)) dnl
+
+ gen_require(`
+ type smtp_port_t;
+ ')
+
+ allow $1 smtp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_smtp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the smtp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_smtp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_smtp_port'($*)) dnl
+
+ gen_require(`
+ type smtp_port_t;
+ ')
+
+ allow $1 smtp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_smtp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send smtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_smtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_client_packet_t;
+ ')
+
+ allow $1 smtp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send smtp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_client_packet_t;
+ ')
+
+ dontaudit $1 smtp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive smtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_smtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_client_packet_t;
+ ')
+
+ allow $1 smtp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive smtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_client_packet_t;
+ ')
+
+ dontaudit $1 smtp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive smtp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smtp_client_packets'($*)) dnl
+
+ corenet_send_smtp_client_packets($1)
+ corenet_receive_smtp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive smtp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smtp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_smtp_client_packets($1)
+ corenet_dontaudit_receive_smtp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smtp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to smtp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_smtp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smtp_client_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_client_packet_t;
+ ')
+
+ allow $1 smtp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_smtp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send smtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_smtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_server_packet_t;
+ ')
+
+ allow $1 smtp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send smtp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_smtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_server_packet_t;
+ ')
+
+ dontaudit $1 smtp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive smtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_smtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_server_packet_t;
+ ')
+
+ allow $1 smtp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive smtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_smtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_server_packet_t;
+ ')
+
+ dontaudit $1 smtp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive smtp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_smtp_server_packets'($*)) dnl
+
+ corenet_send_smtp_server_packets($1)
+ corenet_receive_smtp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive smtp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_smtp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_smtp_server_packets($1)
+ corenet_dontaudit_receive_smtp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_smtp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to smtp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_smtp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_smtp_server_packets'($*)) dnl
+
+ gen_require(`
+ type smtp_server_packet_t;
+ ')
+
+ allow $1 smtp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_smtp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the snmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the snmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the snmp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_snmp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_snmp_port'($*)) dnl
+
+ gen_require(`
+ type snmp_port_t;
+ ')
+
+ allow $1 snmp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_snmp_port'($*)) dnl
+
+ gen_require(`
+ type snmp_port_t;
+ ')
+
+ allow $1 snmp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_snmp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the snmp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_snmp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_snmp_port'($*)) dnl
+
+ gen_require(`
+ type snmp_port_t;
+ ')
+
+ allow $1 snmp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_snmp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send snmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_snmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_client_packet_t;
+ ')
+
+ allow $1 snmp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send snmp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_snmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_client_packet_t;
+ ')
+
+ dontaudit $1 snmp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive snmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_snmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_client_packet_t;
+ ')
+
+ allow $1 snmp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive snmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_snmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_client_packet_t;
+ ')
+
+ dontaudit $1 snmp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive snmp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_snmp_client_packets'($*)) dnl
+
+ corenet_send_snmp_client_packets($1)
+ corenet_receive_snmp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive snmp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_snmp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_snmp_client_packets($1)
+ corenet_dontaudit_receive_snmp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_snmp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to snmp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_snmp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_snmp_client_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_client_packet_t;
+ ')
+
+ allow $1 snmp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_snmp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send snmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_snmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_server_packet_t;
+ ')
+
+ allow $1 snmp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send snmp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_snmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_server_packet_t;
+ ')
+
+ dontaudit $1 snmp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive snmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_snmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_server_packet_t;
+ ')
+
+ allow $1 snmp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive snmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_snmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_server_packet_t;
+ ')
+
+ dontaudit $1 snmp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive snmp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_snmp_server_packets'($*)) dnl
+
+ corenet_send_snmp_server_packets($1)
+ corenet_receive_snmp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive snmp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_snmp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_snmp_server_packets($1)
+ corenet_dontaudit_receive_snmp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_snmp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to snmp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_snmp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_snmp_server_packets'($*)) dnl
+
+ gen_require(`
+ type snmp_server_packet_t;
+ ')
+
+ allow $1 snmp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_snmp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the socks port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the socks port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the socks port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_socks_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_socks_port'($*)) dnl
+
+ gen_require(`
+ type socks_port_t;
+ ')
+
+ allow $1 socks_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_socks_port'($*)) dnl
+
+ gen_require(`
+ type socks_port_t;
+ ')
+
+ allow $1 socks_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_socks_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the socks port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_socks_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_socks_port'($*)) dnl
+
+ gen_require(`
+ type socks_port_t;
+ ')
+
+ allow $1 socks_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_socks_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send socks_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_socks_client_packets'($*)) dnl
+
+ gen_require(`
+ type socks_client_packet_t;
+ ')
+
+ allow $1 socks_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send socks_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_socks_client_packets'($*)) dnl
+
+ gen_require(`
+ type socks_client_packet_t;
+ ')
+
+ dontaudit $1 socks_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive socks_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_socks_client_packets'($*)) dnl
+
+ gen_require(`
+ type socks_client_packet_t;
+ ')
+
+ allow $1 socks_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive socks_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_socks_client_packets'($*)) dnl
+
+ gen_require(`
+ type socks_client_packet_t;
+ ')
+
+ dontaudit $1 socks_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive socks_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_socks_client_packets'($*)) dnl
+
+ corenet_send_socks_client_packets($1)
+ corenet_receive_socks_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive socks_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_socks_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_socks_client_packets($1)
+ corenet_dontaudit_receive_socks_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_socks_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to socks_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_socks_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_socks_client_packets'($*)) dnl
+
+ gen_require(`
+ type socks_client_packet_t;
+ ')
+
+ allow $1 socks_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_socks_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send socks_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_socks_server_packets'($*)) dnl
+
+ gen_require(`
+ type socks_server_packet_t;
+ ')
+
+ allow $1 socks_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send socks_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_socks_server_packets'($*)) dnl
+
+ gen_require(`
+ type socks_server_packet_t;
+ ')
+
+ dontaudit $1 socks_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive socks_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_socks_server_packets'($*)) dnl
+
+ gen_require(`
+ type socks_server_packet_t;
+ ')
+
+ allow $1 socks_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive socks_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_socks_server_packets'($*)) dnl
+
+ gen_require(`
+ type socks_server_packet_t;
+ ')
+
+ dontaudit $1 socks_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive socks_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_socks_server_packets'($*)) dnl
+
+ corenet_send_socks_server_packets($1)
+ corenet_receive_socks_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive socks_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_socks_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_socks_server_packets($1)
+ corenet_dontaudit_receive_socks_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_socks_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to socks_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_socks_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_socks_server_packets'($*)) dnl
+
+ gen_require(`
+ type socks_server_packet_t;
+ ')
+
+ allow $1 socks_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_socks_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the soundd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the soundd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the soundd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_soundd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_soundd_port'($*)) dnl
+
+ gen_require(`
+ type soundd_port_t;
+ ')
+
+ allow $1 soundd_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_soundd_port'($*)) dnl
+
+ gen_require(`
+ type soundd_port_t;
+ ')
+
+ allow $1 soundd_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_soundd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the soundd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_soundd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_soundd_port'($*)) dnl
+
+ gen_require(`
+ type soundd_port_t;
+ ')
+
+ allow $1 soundd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_soundd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send soundd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_soundd_client_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_client_packet_t;
+ ')
+
+ allow $1 soundd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send soundd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_soundd_client_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_client_packet_t;
+ ')
+
+ dontaudit $1 soundd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive soundd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_soundd_client_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_client_packet_t;
+ ')
+
+ allow $1 soundd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive soundd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_soundd_client_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_client_packet_t;
+ ')
+
+ dontaudit $1 soundd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive soundd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_soundd_client_packets'($*)) dnl
+
+ corenet_send_soundd_client_packets($1)
+ corenet_receive_soundd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive soundd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_soundd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_soundd_client_packets($1)
+ corenet_dontaudit_receive_soundd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_soundd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to soundd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_soundd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_soundd_client_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_client_packet_t;
+ ')
+
+ allow $1 soundd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_soundd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send soundd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_soundd_server_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_server_packet_t;
+ ')
+
+ allow $1 soundd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send soundd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_soundd_server_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_server_packet_t;
+ ')
+
+ dontaudit $1 soundd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive soundd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_soundd_server_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_server_packet_t;
+ ')
+
+ allow $1 soundd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive soundd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_soundd_server_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_server_packet_t;
+ ')
+
+ dontaudit $1 soundd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive soundd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_soundd_server_packets'($*)) dnl
+
+ corenet_send_soundd_server_packets($1)
+ corenet_receive_soundd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive soundd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_soundd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_soundd_server_packets($1)
+ corenet_dontaudit_receive_soundd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_soundd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to soundd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_soundd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_soundd_server_packets'($*)) dnl
+
+ gen_require(`
+ type soundd_server_packet_t;
+ ')
+
+ allow $1 soundd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_soundd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the spamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the spamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the spamd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_spamd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_spamd_port'($*)) dnl
+
+ gen_require(`
+ type spamd_port_t;
+ ')
+
+ allow $1 spamd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_spamd_port'($*)) dnl
+
+ gen_require(`
+ type spamd_port_t;
+ ')
+
+ allow $1 spamd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_spamd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the spamd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_spamd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_spamd_port'($*)) dnl
+
+ gen_require(`
+ type spamd_port_t;
+ ')
+
+ allow $1 spamd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_spamd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send spamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_spamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_client_packet_t;
+ ')
+
+ allow $1 spamd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send spamd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_spamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_client_packet_t;
+ ')
+
+ dontaudit $1 spamd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive spamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_spamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_client_packet_t;
+ ')
+
+ allow $1 spamd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive spamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_spamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_client_packet_t;
+ ')
+
+ dontaudit $1 spamd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive spamd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_spamd_client_packets'($*)) dnl
+
+ corenet_send_spamd_client_packets($1)
+ corenet_receive_spamd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive spamd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_spamd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_spamd_client_packets($1)
+ corenet_dontaudit_receive_spamd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_spamd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to spamd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_spamd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_spamd_client_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_client_packet_t;
+ ')
+
+ allow $1 spamd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_spamd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send spamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_spamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_server_packet_t;
+ ')
+
+ allow $1 spamd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send spamd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_spamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_server_packet_t;
+ ')
+
+ dontaudit $1 spamd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive spamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_spamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_server_packet_t;
+ ')
+
+ allow $1 spamd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive spamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_spamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_server_packet_t;
+ ')
+
+ dontaudit $1 spamd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive spamd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_spamd_server_packets'($*)) dnl
+
+ corenet_send_spamd_server_packets($1)
+ corenet_receive_spamd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive spamd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_spamd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_spamd_server_packets($1)
+ corenet_dontaudit_receive_spamd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_spamd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to spamd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_spamd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_spamd_server_packets'($*)) dnl
+
+ gen_require(`
+ type spamd_server_packet_t;
+ ')
+
+ allow $1 spamd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_spamd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the speech port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the speech port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the speech port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_speech_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_speech_port'($*)) dnl
+
+ gen_require(`
+ type speech_port_t;
+ ')
+
+ allow $1 speech_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_speech_port'($*)) dnl
+
+ gen_require(`
+ type speech_port_t;
+ ')
+
+ allow $1 speech_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_speech_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the speech port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_speech_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_speech_port'($*)) dnl
+
+ gen_require(`
+ type speech_port_t;
+ ')
+
+ allow $1 speech_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_speech_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send speech_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_speech_client_packets'($*)) dnl
+
+ gen_require(`
+ type speech_client_packet_t;
+ ')
+
+ allow $1 speech_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send speech_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_speech_client_packets'($*)) dnl
+
+ gen_require(`
+ type speech_client_packet_t;
+ ')
+
+ dontaudit $1 speech_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive speech_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_speech_client_packets'($*)) dnl
+
+ gen_require(`
+ type speech_client_packet_t;
+ ')
+
+ allow $1 speech_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive speech_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_speech_client_packets'($*)) dnl
+
+ gen_require(`
+ type speech_client_packet_t;
+ ')
+
+ dontaudit $1 speech_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive speech_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_speech_client_packets'($*)) dnl
+
+ corenet_send_speech_client_packets($1)
+ corenet_receive_speech_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive speech_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_speech_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_speech_client_packets($1)
+ corenet_dontaudit_receive_speech_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_speech_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to speech_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_speech_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_speech_client_packets'($*)) dnl
+
+ gen_require(`
+ type speech_client_packet_t;
+ ')
+
+ allow $1 speech_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_speech_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send speech_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_speech_server_packets'($*)) dnl
+
+ gen_require(`
+ type speech_server_packet_t;
+ ')
+
+ allow $1 speech_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send speech_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_speech_server_packets'($*)) dnl
+
+ gen_require(`
+ type speech_server_packet_t;
+ ')
+
+ dontaudit $1 speech_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive speech_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_speech_server_packets'($*)) dnl
+
+ gen_require(`
+ type speech_server_packet_t;
+ ')
+
+ allow $1 speech_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive speech_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_speech_server_packets'($*)) dnl
+
+ gen_require(`
+ type speech_server_packet_t;
+ ')
+
+ dontaudit $1 speech_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive speech_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_speech_server_packets'($*)) dnl
+
+ corenet_send_speech_server_packets($1)
+ corenet_receive_speech_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive speech_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_speech_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_speech_server_packets($1)
+ corenet_dontaudit_receive_speech_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_speech_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to speech_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_speech_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_speech_server_packets'($*)) dnl
+
+ gen_require(`
+ type speech_server_packet_t;
+ ')
+
+ allow $1 speech_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_speech_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the squid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the squid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the squid port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_squid_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_squid_port'($*)) dnl
+
+ gen_require(`
+ type squid_port_t;
+ ')
+
+ allow $1 squid_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_squid_port'($*)) dnl
+
+ gen_require(`
+ type squid_port_t;
+ ')
+
+ allow $1 squid_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_squid_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the squid port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_squid_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_squid_port'($*)) dnl
+
+ gen_require(`
+ type squid_port_t;
+ ')
+
+ allow $1 squid_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_squid_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send squid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_squid_client_packets'($*)) dnl
+
+ gen_require(`
+ type squid_client_packet_t;
+ ')
+
+ allow $1 squid_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send squid_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_squid_client_packets'($*)) dnl
+
+ gen_require(`
+ type squid_client_packet_t;
+ ')
+
+ dontaudit $1 squid_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive squid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_squid_client_packets'($*)) dnl
+
+ gen_require(`
+ type squid_client_packet_t;
+ ')
+
+ allow $1 squid_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive squid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_squid_client_packets'($*)) dnl
+
+ gen_require(`
+ type squid_client_packet_t;
+ ')
+
+ dontaudit $1 squid_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive squid_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_squid_client_packets'($*)) dnl
+
+ corenet_send_squid_client_packets($1)
+ corenet_receive_squid_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive squid_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_squid_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_squid_client_packets($1)
+ corenet_dontaudit_receive_squid_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_squid_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to squid_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_squid_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_squid_client_packets'($*)) dnl
+
+ gen_require(`
+ type squid_client_packet_t;
+ ')
+
+ allow $1 squid_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_squid_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send squid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_squid_server_packets'($*)) dnl
+
+ gen_require(`
+ type squid_server_packet_t;
+ ')
+
+ allow $1 squid_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send squid_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_squid_server_packets'($*)) dnl
+
+ gen_require(`
+ type squid_server_packet_t;
+ ')
+
+ dontaudit $1 squid_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive squid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_squid_server_packets'($*)) dnl
+
+ gen_require(`
+ type squid_server_packet_t;
+ ')
+
+ allow $1 squid_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive squid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_squid_server_packets'($*)) dnl
+
+ gen_require(`
+ type squid_server_packet_t;
+ ')
+
+ dontaudit $1 squid_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive squid_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_squid_server_packets'($*)) dnl
+
+ corenet_send_squid_server_packets($1)
+ corenet_receive_squid_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive squid_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_squid_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_squid_server_packets($1)
+ corenet_dontaudit_receive_squid_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_squid_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to squid_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_squid_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_squid_server_packets'($*)) dnl
+
+ gen_require(`
+ type squid_server_packet_t;
+ ')
+
+ allow $1 squid_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_squid_server_packets'($*)) dnl
+ ')
+
+
+ # snmp and htcp
+
+
+########################################
+##
+## Send and receive TCP traffic on the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ssdp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ssdp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ssdp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ssdp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ssdp_port'($*)) dnl
+
+ gen_require(`
+ type ssdp_port_t;
+ ')
+
+ allow $1 ssdp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ssdp_port'($*)) dnl
+
+ gen_require(`
+ type ssdp_port_t;
+ ')
+
+ allow $1 ssdp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ssdp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ssdp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ssdp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ssdp_port'($*)) dnl
+
+ gen_require(`
+ type ssdp_port_t;
+ ')
+
+ allow $1 ssdp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ssdp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ssdp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ssdp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_client_packet_t;
+ ')
+
+ allow $1 ssdp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ssdp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssdp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_client_packet_t;
+ ')
+
+ dontaudit $1 ssdp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ssdp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ssdp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_client_packet_t;
+ ')
+
+ allow $1 ssdp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ssdp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssdp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_client_packet_t;
+ ')
+
+ dontaudit $1 ssdp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ssdp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssdp_client_packets'($*)) dnl
+
+ corenet_send_ssdp_client_packets($1)
+ corenet_receive_ssdp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ssdp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssdp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ssdp_client_packets($1)
+ corenet_dontaudit_receive_ssdp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssdp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ssdp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ssdp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssdp_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_client_packet_t;
+ ')
+
+ allow $1 ssdp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssdp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ssdp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ssdp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_server_packet_t;
+ ')
+
+ allow $1 ssdp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ssdp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssdp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_server_packet_t;
+ ')
+
+ dontaudit $1 ssdp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ssdp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ssdp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_server_packet_t;
+ ')
+
+ allow $1 ssdp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ssdp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssdp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_server_packet_t;
+ ')
+
+ dontaudit $1 ssdp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ssdp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssdp_server_packets'($*)) dnl
+
+ corenet_send_ssdp_server_packets($1)
+ corenet_receive_ssdp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ssdp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssdp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ssdp_server_packets($1)
+ corenet_dontaudit_receive_ssdp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssdp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ssdp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ssdp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssdp_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssdp_server_packet_t;
+ ')
+
+ allow $1 ssdp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssdp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ssh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ssh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ssh port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ssh_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ssh_port'($*)) dnl
+
+ gen_require(`
+ type ssh_port_t;
+ ')
+
+ allow $1 ssh_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ssh_port'($*)) dnl
+
+ gen_require(`
+ type ssh_port_t;
+ ')
+
+ allow $1 ssh_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ssh_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ssh port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ssh_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ssh_port'($*)) dnl
+
+ gen_require(`
+ type ssh_port_t;
+ ')
+
+ allow $1 ssh_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ssh_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ssh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ssh_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_client_packet_t;
+ ')
+
+ allow $1 ssh_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ssh_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssh_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_client_packet_t;
+ ')
+
+ dontaudit $1 ssh_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ssh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ssh_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_client_packet_t;
+ ')
+
+ allow $1 ssh_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ssh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssh_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_client_packet_t;
+ ')
+
+ dontaudit $1 ssh_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ssh_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssh_client_packets'($*)) dnl
+
+ corenet_send_ssh_client_packets($1)
+ corenet_receive_ssh_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ssh_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssh_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ssh_client_packets($1)
+ corenet_dontaudit_receive_ssh_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssh_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ssh_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ssh_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssh_client_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_client_packet_t;
+ ')
+
+ allow $1 ssh_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssh_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ssh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ssh_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_server_packet_t;
+ ')
+
+ allow $1 ssh_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ssh_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ssh_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_server_packet_t;
+ ')
+
+ dontaudit $1 ssh_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ssh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ssh_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_server_packet_t;
+ ')
+
+ allow $1 ssh_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ssh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ssh_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_server_packet_t;
+ ')
+
+ dontaudit $1 ssh_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ssh_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ssh_server_packets'($*)) dnl
+
+ corenet_send_ssh_server_packets($1)
+ corenet_receive_ssh_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ssh_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ssh_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ssh_server_packets($1)
+ corenet_dontaudit_receive_ssh_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ssh_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ssh_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ssh_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ssh_server_packets'($*)) dnl
+
+ gen_require(`
+ type ssh_server_packet_t;
+ ')
+
+ allow $1 ssh_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ssh_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the stunnel port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the stunnel port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the stunnel port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_stunnel_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_stunnel_port'($*)) dnl
+
+ gen_require(`
+ type stunnel_port_t;
+ ')
+
+ allow $1 stunnel_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_stunnel_port'($*)) dnl
+
+ gen_require(`
+ type stunnel_port_t;
+ ')
+
+ allow $1 stunnel_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_stunnel_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the stunnel port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_stunnel_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_stunnel_port'($*)) dnl
+
+ gen_require(`
+ type stunnel_port_t;
+ ')
+
+ allow $1 stunnel_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_stunnel_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send stunnel_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_stunnel_client_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_client_packet_t;
+ ')
+
+ allow $1 stunnel_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send stunnel_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_stunnel_client_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_client_packet_t;
+ ')
+
+ dontaudit $1 stunnel_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive stunnel_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_stunnel_client_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_client_packet_t;
+ ')
+
+ allow $1 stunnel_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive stunnel_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_stunnel_client_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_client_packet_t;
+ ')
+
+ dontaudit $1 stunnel_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive stunnel_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_stunnel_client_packets'($*)) dnl
+
+ corenet_send_stunnel_client_packets($1)
+ corenet_receive_stunnel_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive stunnel_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_stunnel_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_stunnel_client_packets($1)
+ corenet_dontaudit_receive_stunnel_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_stunnel_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to stunnel_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_stunnel_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_stunnel_client_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_client_packet_t;
+ ')
+
+ allow $1 stunnel_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_stunnel_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send stunnel_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_stunnel_server_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_server_packet_t;
+ ')
+
+ allow $1 stunnel_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send stunnel_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_stunnel_server_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_server_packet_t;
+ ')
+
+ dontaudit $1 stunnel_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive stunnel_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_stunnel_server_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_server_packet_t;
+ ')
+
+ allow $1 stunnel_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive stunnel_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_stunnel_server_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_server_packet_t;
+ ')
+
+ dontaudit $1 stunnel_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive stunnel_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_stunnel_server_packets'($*)) dnl
+
+ corenet_send_stunnel_server_packets($1)
+ corenet_receive_stunnel_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive stunnel_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_stunnel_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_stunnel_server_packets($1)
+ corenet_dontaudit_receive_stunnel_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_stunnel_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to stunnel_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_stunnel_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_stunnel_server_packets'($*)) dnl
+
+ gen_require(`
+ type stunnel_server_packet_t;
+ ')
+
+ allow $1 stunnel_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_stunnel_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the svn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the svn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the svn port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_svn_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_svn_port'($*)) dnl
+
+ gen_require(`
+ type svn_port_t;
+ ')
+
+ allow $1 svn_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_svn_port'($*)) dnl
+
+ gen_require(`
+ type svn_port_t;
+ ')
+
+ allow $1 svn_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_svn_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the svn port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_svn_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_svn_port'($*)) dnl
+
+ gen_require(`
+ type svn_port_t;
+ ')
+
+ allow $1 svn_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_svn_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send svn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_svn_client_packets'($*)) dnl
+
+ gen_require(`
+ type svn_client_packet_t;
+ ')
+
+ allow $1 svn_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send svn_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svn_client_packets'($*)) dnl
+
+ gen_require(`
+ type svn_client_packet_t;
+ ')
+
+ dontaudit $1 svn_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive svn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_svn_client_packets'($*)) dnl
+
+ gen_require(`
+ type svn_client_packet_t;
+ ')
+
+ allow $1 svn_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive svn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svn_client_packets'($*)) dnl
+
+ gen_require(`
+ type svn_client_packet_t;
+ ')
+
+ dontaudit $1 svn_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive svn_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svn_client_packets'($*)) dnl
+
+ corenet_send_svn_client_packets($1)
+ corenet_receive_svn_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive svn_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svn_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_svn_client_packets($1)
+ corenet_dontaudit_receive_svn_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svn_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to svn_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_svn_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svn_client_packets'($*)) dnl
+
+ gen_require(`
+ type svn_client_packet_t;
+ ')
+
+ allow $1 svn_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_svn_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send svn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_svn_server_packets'($*)) dnl
+
+ gen_require(`
+ type svn_server_packet_t;
+ ')
+
+ allow $1 svn_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send svn_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svn_server_packets'($*)) dnl
+
+ gen_require(`
+ type svn_server_packet_t;
+ ')
+
+ dontaudit $1 svn_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive svn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_svn_server_packets'($*)) dnl
+
+ gen_require(`
+ type svn_server_packet_t;
+ ')
+
+ allow $1 svn_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive svn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svn_server_packets'($*)) dnl
+
+ gen_require(`
+ type svn_server_packet_t;
+ ')
+
+ dontaudit $1 svn_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive svn_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svn_server_packets'($*)) dnl
+
+ corenet_send_svn_server_packets($1)
+ corenet_receive_svn_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive svn_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svn_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_svn_server_packets($1)
+ corenet_dontaudit_receive_svn_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svn_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to svn_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_svn_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svn_server_packets'($*)) dnl
+
+ gen_require(`
+ type svn_server_packet_t;
+ ')
+
+ allow $1 svn_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_svn_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the svrloc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the svrloc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the svrloc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_svrloc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_svrloc_port'($*)) dnl
+
+ gen_require(`
+ type svrloc_port_t;
+ ')
+
+ allow $1 svrloc_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_svrloc_port'($*)) dnl
+
+ gen_require(`
+ type svrloc_port_t;
+ ')
+
+ allow $1 svrloc_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_svrloc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the svrloc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_svrloc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_svrloc_port'($*)) dnl
+
+ gen_require(`
+ type svrloc_port_t;
+ ')
+
+ allow $1 svrloc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_svrloc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send svrloc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_svrloc_client_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_client_packet_t;
+ ')
+
+ allow $1 svrloc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send svrloc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svrloc_client_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_client_packet_t;
+ ')
+
+ dontaudit $1 svrloc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive svrloc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_svrloc_client_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_client_packet_t;
+ ')
+
+ allow $1 svrloc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive svrloc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svrloc_client_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_client_packet_t;
+ ')
+
+ dontaudit $1 svrloc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive svrloc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svrloc_client_packets'($*)) dnl
+
+ corenet_send_svrloc_client_packets($1)
+ corenet_receive_svrloc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive svrloc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svrloc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_svrloc_client_packets($1)
+ corenet_dontaudit_receive_svrloc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svrloc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to svrloc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_svrloc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svrloc_client_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_client_packet_t;
+ ')
+
+ allow $1 svrloc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_svrloc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send svrloc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_svrloc_server_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_server_packet_t;
+ ')
+
+ allow $1 svrloc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send svrloc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_svrloc_server_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_server_packet_t;
+ ')
+
+ dontaudit $1 svrloc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive svrloc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_svrloc_server_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_server_packet_t;
+ ')
+
+ allow $1 svrloc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive svrloc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_svrloc_server_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_server_packet_t;
+ ')
+
+ dontaudit $1 svrloc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive svrloc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_svrloc_server_packets'($*)) dnl
+
+ corenet_send_svrloc_server_packets($1)
+ corenet_receive_svrloc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive svrloc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_svrloc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_svrloc_server_packets($1)
+ corenet_dontaudit_receive_svrloc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_svrloc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to svrloc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_svrloc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_svrloc_server_packets'($*)) dnl
+
+ gen_require(`
+ type svrloc_server_packet_t;
+ ')
+
+ allow $1 svrloc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_svrloc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the swat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the swat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the swat port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_swat_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_swat_port'($*)) dnl
+
+ gen_require(`
+ type swat_port_t;
+ ')
+
+ allow $1 swat_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_swat_port'($*)) dnl
+
+ gen_require(`
+ type swat_port_t;
+ ')
+
+ allow $1 swat_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_swat_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the swat port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_swat_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_swat_port'($*)) dnl
+
+ gen_require(`
+ type swat_port_t;
+ ')
+
+ allow $1 swat_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_swat_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send swat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_swat_client_packets'($*)) dnl
+
+ gen_require(`
+ type swat_client_packet_t;
+ ')
+
+ allow $1 swat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send swat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_swat_client_packets'($*)) dnl
+
+ gen_require(`
+ type swat_client_packet_t;
+ ')
+
+ dontaudit $1 swat_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive swat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_swat_client_packets'($*)) dnl
+
+ gen_require(`
+ type swat_client_packet_t;
+ ')
+
+ allow $1 swat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive swat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_swat_client_packets'($*)) dnl
+
+ gen_require(`
+ type swat_client_packet_t;
+ ')
+
+ dontaudit $1 swat_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive swat_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_swat_client_packets'($*)) dnl
+
+ corenet_send_swat_client_packets($1)
+ corenet_receive_swat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive swat_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_swat_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_swat_client_packets($1)
+ corenet_dontaudit_receive_swat_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_swat_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to swat_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_swat_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_swat_client_packets'($*)) dnl
+
+ gen_require(`
+ type swat_client_packet_t;
+ ')
+
+ allow $1 swat_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_swat_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send swat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_swat_server_packets'($*)) dnl
+
+ gen_require(`
+ type swat_server_packet_t;
+ ')
+
+ allow $1 swat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send swat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_swat_server_packets'($*)) dnl
+
+ gen_require(`
+ type swat_server_packet_t;
+ ')
+
+ dontaudit $1 swat_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive swat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_swat_server_packets'($*)) dnl
+
+ gen_require(`
+ type swat_server_packet_t;
+ ')
+
+ allow $1 swat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive swat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_swat_server_packets'($*)) dnl
+
+ gen_require(`
+ type swat_server_packet_t;
+ ')
+
+ dontaudit $1 swat_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive swat_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_swat_server_packets'($*)) dnl
+
+ corenet_send_swat_server_packets($1)
+ corenet_receive_swat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive swat_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_swat_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_swat_server_packets($1)
+ corenet_dontaudit_receive_swat_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_swat_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to swat_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_swat_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_swat_server_packets'($*)) dnl
+
+ gen_require(`
+ type swat_server_packet_t;
+ ')
+
+ allow $1 swat_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_swat_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the syncthing port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the syncthing port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the syncthing port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_port_t;
+ ')
+
+ allow $1 syncthing_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_port_t;
+ ')
+
+ allow $1 syncthing_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the syncthing port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_syncthing_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_port_t;
+ ')
+
+ allow $1 syncthing_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_client_packet_t;
+ ')
+
+ allow $1 syncthing_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_client_packet_t;
+ ')
+
+ allow $1 syncthing_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_client_packets'($*)) dnl
+
+ corenet_send_syncthing_client_packets($1)
+ corenet_receive_syncthing_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_client_packets($1)
+ corenet_dontaudit_receive_syncthing_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_client_packet_t;
+ ')
+
+ allow $1 syncthing_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_server_packet_t;
+ ')
+
+ allow $1 syncthing_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_server_packet_t;
+ ')
+
+ allow $1 syncthing_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_server_packets'($*)) dnl
+
+ corenet_send_syncthing_server_packets($1)
+ corenet_receive_syncthing_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_server_packets($1)
+ corenet_dontaudit_receive_syncthing_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_server_packet_t;
+ ')
+
+ allow $1 syncthing_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the syncthing_admin port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_admin_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_admin_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_port_t;
+ ')
+
+ allow $1 syncthing_admin_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_admin_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_port_t;
+ ')
+
+ allow $1 syncthing_admin_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_admin_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the syncthing_admin port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_syncthing_admin_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_admin_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_port_t;
+ ')
+
+ allow $1 syncthing_admin_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_admin_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_client_packet_t;
+ ')
+
+ allow $1 syncthing_admin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_admin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_admin_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_client_packet_t;
+ ')
+
+ allow $1 syncthing_admin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_admin_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_admin_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_admin_client_packets'($*)) dnl
+
+ corenet_send_syncthing_admin_client_packets($1)
+ corenet_receive_syncthing_admin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_admin_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_admin_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_admin_client_packets($1)
+ corenet_dontaudit_receive_syncthing_admin_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_admin_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_admin_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_admin_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_client_packet_t;
+ ')
+
+ allow $1 syncthing_admin_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_admin_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_server_packet_t;
+ ')
+
+ allow $1 syncthing_admin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_admin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_admin_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_server_packet_t;
+ ')
+
+ allow $1 syncthing_admin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_admin_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_admin_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_admin_server_packets'($*)) dnl
+
+ corenet_send_syncthing_admin_server_packets($1)
+ corenet_receive_syncthing_admin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_admin_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_admin_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_admin_server_packets($1)
+ corenet_dontaudit_receive_syncthing_admin_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_admin_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_admin_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_admin_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_admin_server_packet_t;
+ ')
+
+ allow $1 syncthing_admin_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_admin_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the syncthing_discovery port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syncthing_discovery_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syncthing_discovery_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_port_t;
+ ')
+
+ allow $1 syncthing_discovery_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syncthing_discovery_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_port_t;
+ ')
+
+ allow $1 syncthing_discovery_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the syncthing_discovery port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_syncthing_discovery_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syncthing_discovery_port'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_port_t;
+ ')
+
+ allow $1 syncthing_discovery_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syncthing_discovery_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_discovery_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_discovery_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_client_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_discovery_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_discovery_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_discovery_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_discovery_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_discovery_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_client_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_discovery_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_discovery_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_client_packet_t;
+ ')
+
+ dontaudit $1 syncthing_discovery_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_discovery_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_discovery_client_packets'($*)) dnl
+
+ corenet_send_syncthing_discovery_client_packets($1)
+ corenet_receive_syncthing_discovery_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_discovery_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_discovery_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_discovery_client_packets($1)
+ corenet_dontaudit_receive_syncthing_discovery_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_discovery_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_discovery_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_discovery_client_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_client_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_discovery_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syncthing_discovery_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syncthing_discovery_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_server_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syncthing_discovery_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syncthing_discovery_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_discovery_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syncthing_discovery_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syncthing_discovery_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_server_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syncthing_discovery_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syncthing_discovery_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_server_packet_t;
+ ')
+
+ dontaudit $1 syncthing_discovery_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syncthing_discovery_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syncthing_discovery_server_packets'($*)) dnl
+
+ corenet_send_syncthing_discovery_server_packets($1)
+ corenet_receive_syncthing_discovery_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syncthing_discovery_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syncthing_discovery_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_syncthing_discovery_server_packets($1)
+ corenet_dontaudit_receive_syncthing_discovery_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syncthing_discovery_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syncthing_discovery_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syncthing_discovery_server_packets'($*)) dnl
+
+ gen_require(`
+ type syncthing_discovery_server_packet_t;
+ ')
+
+ allow $1 syncthing_discovery_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syncthing_discovery_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the sype_transport port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_sype_transport_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_sype_transport_port'($*)) dnl
+
+ gen_require(`
+ type sype_transport_port_t;
+ ')
+
+ allow $1 sype_transport_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_sype_transport_port'($*)) dnl
+
+ gen_require(`
+ type sype_transport_port_t;
+ ')
+
+ allow $1 sype_transport_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_sype_transport_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the sype_transport port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_sype_transport_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_sype_transport_port'($*)) dnl
+
+ gen_require(`
+ type sype_transport_port_t;
+ ')
+
+ allow $1 sype_transport_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_sype_transport_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sype_transport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sype_transport_client_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_client_packet_t;
+ ')
+
+ allow $1 sype_transport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sype_transport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sype_transport_client_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_client_packet_t;
+ ')
+
+ dontaudit $1 sype_transport_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sype_transport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sype_transport_client_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_client_packet_t;
+ ')
+
+ allow $1 sype_transport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sype_transport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sype_transport_client_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_client_packet_t;
+ ')
+
+ dontaudit $1 sype_transport_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sype_transport_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sype_transport_client_packets'($*)) dnl
+
+ corenet_send_sype_transport_client_packets($1)
+ corenet_receive_sype_transport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sype_transport_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sype_transport_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_sype_transport_client_packets($1)
+ corenet_dontaudit_receive_sype_transport_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sype_transport_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sype_transport_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sype_transport_client_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_client_packet_t;
+ ')
+
+ allow $1 sype_transport_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sype_transport_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send sype_transport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_sype_transport_server_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_server_packet_t;
+ ')
+
+ allow $1 sype_transport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send sype_transport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_sype_transport_server_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_server_packet_t;
+ ')
+
+ dontaudit $1 sype_transport_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive sype_transport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_sype_transport_server_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_server_packet_t;
+ ')
+
+ allow $1 sype_transport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive sype_transport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_sype_transport_server_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_server_packet_t;
+ ')
+
+ dontaudit $1 sype_transport_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive sype_transport_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_sype_transport_server_packets'($*)) dnl
+
+ corenet_send_sype_transport_server_packets($1)
+ corenet_receive_sype_transport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive sype_transport_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_sype_transport_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_sype_transport_server_packets($1)
+ corenet_dontaudit_receive_sype_transport_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to sype_transport_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_sype_transport_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_sype_transport_server_packets'($*)) dnl
+
+ gen_require(`
+ type sype_transport_server_packet_t;
+ ')
+
+ allow $1 sype_transport_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_sype_transport_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the syslogd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the syslogd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the syslogd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syslogd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syslogd_port'($*)) dnl
+
+ gen_require(`
+ type syslogd_port_t;
+ ')
+
+ allow $1 syslogd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syslogd_port'($*)) dnl
+
+ gen_require(`
+ type syslogd_port_t;
+ ')
+
+ allow $1 syslogd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syslogd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the syslogd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_syslogd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syslogd_port'($*)) dnl
+
+ gen_require(`
+ type syslogd_port_t;
+ ')
+
+ allow $1 syslogd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syslogd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syslogd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syslogd_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_client_packet_t;
+ ')
+
+ allow $1 syslogd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syslogd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslogd_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_client_packet_t;
+ ')
+
+ dontaudit $1 syslogd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syslogd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syslogd_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_client_packet_t;
+ ')
+
+ allow $1 syslogd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syslogd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslogd_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_client_packet_t;
+ ')
+
+ dontaudit $1 syslogd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syslogd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslogd_client_packets'($*)) dnl
+
+ corenet_send_syslogd_client_packets($1)
+ corenet_receive_syslogd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syslogd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslogd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_syslogd_client_packets($1)
+ corenet_dontaudit_receive_syslogd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslogd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syslogd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syslogd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslogd_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_client_packet_t;
+ ')
+
+ allow $1 syslogd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslogd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syslogd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syslogd_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_server_packet_t;
+ ')
+
+ allow $1 syslogd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syslogd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslogd_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_server_packet_t;
+ ')
+
+ dontaudit $1 syslogd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syslogd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syslogd_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_server_packet_t;
+ ')
+
+ allow $1 syslogd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syslogd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslogd_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_server_packet_t;
+ ')
+
+ dontaudit $1 syslogd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syslogd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslogd_server_packets'($*)) dnl
+
+ corenet_send_syslogd_server_packets($1)
+ corenet_receive_syslogd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syslogd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslogd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_syslogd_server_packets($1)
+ corenet_dontaudit_receive_syslogd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslogd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syslogd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syslogd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslogd_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslogd_server_packet_t;
+ ')
+
+ allow $1 syslogd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslogd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the syslog_tls port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_syslog_tls_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_syslog_tls_port'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_port_t;
+ ')
+
+ allow $1 syslog_tls_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_syslog_tls_port'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_port_t;
+ ')
+
+ allow $1 syslog_tls_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_syslog_tls_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the syslog_tls port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_syslog_tls_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_syslog_tls_port'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_port_t;
+ ')
+
+ allow $1 syslog_tls_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_syslog_tls_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syslog_tls_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syslog_tls_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_client_packet_t;
+ ')
+
+ allow $1 syslog_tls_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syslog_tls_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslog_tls_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_client_packet_t;
+ ')
+
+ dontaudit $1 syslog_tls_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syslog_tls_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syslog_tls_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_client_packet_t;
+ ')
+
+ allow $1 syslog_tls_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syslog_tls_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslog_tls_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_client_packet_t;
+ ')
+
+ dontaudit $1 syslog_tls_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syslog_tls_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslog_tls_client_packets'($*)) dnl
+
+ corenet_send_syslog_tls_client_packets($1)
+ corenet_receive_syslog_tls_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syslog_tls_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslog_tls_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_syslog_tls_client_packets($1)
+ corenet_dontaudit_receive_syslog_tls_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syslog_tls_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syslog_tls_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslog_tls_client_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_client_packet_t;
+ ')
+
+ allow $1 syslog_tls_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslog_tls_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send syslog_tls_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_syslog_tls_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_server_packet_t;
+ ')
+
+ allow $1 syslog_tls_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send syslog_tls_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_syslog_tls_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_server_packet_t;
+ ')
+
+ dontaudit $1 syslog_tls_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive syslog_tls_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_syslog_tls_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_server_packet_t;
+ ')
+
+ allow $1 syslog_tls_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive syslog_tls_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_syslog_tls_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_server_packet_t;
+ ')
+
+ dontaudit $1 syslog_tls_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive syslog_tls_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_syslog_tls_server_packets'($*)) dnl
+
+ corenet_send_syslog_tls_server_packets($1)
+ corenet_receive_syslog_tls_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive syslog_tls_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_syslog_tls_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_syslog_tls_server_packets($1)
+ corenet_dontaudit_receive_syslog_tls_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to syslog_tls_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_syslog_tls_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_syslog_tls_server_packets'($*)) dnl
+
+ gen_require(`
+ type syslog_tls_server_packet_t;
+ ')
+
+ allow $1 syslog_tls_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_syslog_tls_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the tcs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the tcs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the tcs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tcs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tcs_port'($*)) dnl
+
+ gen_require(`
+ type tcs_port_t;
+ ')
+
+ allow $1 tcs_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tcs_port'($*)) dnl
+
+ gen_require(`
+ type tcs_port_t;
+ ')
+
+ allow $1 tcs_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tcs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the tcs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_tcs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tcs_port'($*)) dnl
+
+ gen_require(`
+ type tcs_port_t;
+ ')
+
+ allow $1 tcs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tcs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tcs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tcs_client_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_client_packet_t;
+ ')
+
+ allow $1 tcs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tcs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tcs_client_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_client_packet_t;
+ ')
+
+ dontaudit $1 tcs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tcs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tcs_client_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_client_packet_t;
+ ')
+
+ allow $1 tcs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tcs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tcs_client_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_client_packet_t;
+ ')
+
+ dontaudit $1 tcs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tcs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tcs_client_packets'($*)) dnl
+
+ corenet_send_tcs_client_packets($1)
+ corenet_receive_tcs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tcs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tcs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_tcs_client_packets($1)
+ corenet_dontaudit_receive_tcs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tcs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tcs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tcs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tcs_client_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_client_packet_t;
+ ')
+
+ allow $1 tcs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tcs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tcs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tcs_server_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_server_packet_t;
+ ')
+
+ allow $1 tcs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tcs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tcs_server_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_server_packet_t;
+ ')
+
+ dontaudit $1 tcs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tcs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tcs_server_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_server_packet_t;
+ ')
+
+ allow $1 tcs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tcs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tcs_server_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_server_packet_t;
+ ')
+
+ dontaudit $1 tcs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tcs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tcs_server_packets'($*)) dnl
+
+ corenet_send_tcs_server_packets($1)
+ corenet_receive_tcs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tcs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tcs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_tcs_server_packets($1)
+ corenet_dontaudit_receive_tcs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tcs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tcs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tcs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tcs_server_packets'($*)) dnl
+
+ gen_require(`
+ type tcs_server_packet_t;
+ ')
+
+ allow $1 tcs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tcs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the telnetd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the telnetd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the telnetd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_telnetd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_telnetd_port'($*)) dnl
+
+ gen_require(`
+ type telnetd_port_t;
+ ')
+
+ allow $1 telnetd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_telnetd_port'($*)) dnl
+
+ gen_require(`
+ type telnetd_port_t;
+ ')
+
+ allow $1 telnetd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_telnetd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the telnetd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_telnetd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_telnetd_port'($*)) dnl
+
+ gen_require(`
+ type telnetd_port_t;
+ ')
+
+ allow $1 telnetd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_telnetd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send telnetd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_telnetd_client_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_client_packet_t;
+ ')
+
+ allow $1 telnetd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send telnetd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_telnetd_client_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_client_packet_t;
+ ')
+
+ dontaudit $1 telnetd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive telnetd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_telnetd_client_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_client_packet_t;
+ ')
+
+ allow $1 telnetd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive telnetd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_telnetd_client_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_client_packet_t;
+ ')
+
+ dontaudit $1 telnetd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive telnetd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_telnetd_client_packets'($*)) dnl
+
+ corenet_send_telnetd_client_packets($1)
+ corenet_receive_telnetd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive telnetd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_telnetd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_telnetd_client_packets($1)
+ corenet_dontaudit_receive_telnetd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_telnetd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to telnetd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_telnetd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_telnetd_client_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_client_packet_t;
+ ')
+
+ allow $1 telnetd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_telnetd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send telnetd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_telnetd_server_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_server_packet_t;
+ ')
+
+ allow $1 telnetd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send telnetd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_telnetd_server_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_server_packet_t;
+ ')
+
+ dontaudit $1 telnetd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive telnetd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_telnetd_server_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_server_packet_t;
+ ')
+
+ allow $1 telnetd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive telnetd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_telnetd_server_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_server_packet_t;
+ ')
+
+ dontaudit $1 telnetd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive telnetd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_telnetd_server_packets'($*)) dnl
+
+ corenet_send_telnetd_server_packets($1)
+ corenet_receive_telnetd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive telnetd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_telnetd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_telnetd_server_packets($1)
+ corenet_dontaudit_receive_telnetd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_telnetd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to telnetd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_telnetd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_telnetd_server_packets'($*)) dnl
+
+ gen_require(`
+ type telnetd_server_packet_t;
+ ')
+
+ allow $1 telnetd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_telnetd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the tftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the tftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the tftp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tftp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tftp_port'($*)) dnl
+
+ gen_require(`
+ type tftp_port_t;
+ ')
+
+ allow $1 tftp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tftp_port'($*)) dnl
+
+ gen_require(`
+ type tftp_port_t;
+ ')
+
+ allow $1 tftp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tftp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the tftp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_tftp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tftp_port'($*)) dnl
+
+ gen_require(`
+ type tftp_port_t;
+ ')
+
+ allow $1 tftp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tftp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_client_packet_t;
+ ')
+
+ allow $1 tftp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tftp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_client_packet_t;
+ ')
+
+ dontaudit $1 tftp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_client_packet_t;
+ ')
+
+ allow $1 tftp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_client_packet_t;
+ ')
+
+ dontaudit $1 tftp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tftp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tftp_client_packets'($*)) dnl
+
+ corenet_send_tftp_client_packets($1)
+ corenet_receive_tftp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tftp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tftp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_tftp_client_packets($1)
+ corenet_dontaudit_receive_tftp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tftp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tftp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tftp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tftp_client_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_client_packet_t;
+ ')
+
+ allow $1 tftp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tftp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_server_packet_t;
+ ')
+
+ allow $1 tftp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tftp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_server_packet_t;
+ ')
+
+ dontaudit $1 tftp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_server_packet_t;
+ ')
+
+ allow $1 tftp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_server_packet_t;
+ ')
+
+ dontaudit $1 tftp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tftp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tftp_server_packets'($*)) dnl
+
+ corenet_send_tftp_server_packets($1)
+ corenet_receive_tftp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tftp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tftp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_tftp_server_packets($1)
+ corenet_dontaudit_receive_tftp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tftp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tftp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tftp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tftp_server_packets'($*)) dnl
+
+ gen_require(`
+ type tftp_server_packet_t;
+ ')
+
+ allow $1 tftp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tftp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the tor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the tor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the tor port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_tor_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_tor_port'($*)) dnl
+
+ gen_require(`
+ type tor_port_t;
+ ')
+
+ allow $1 tor_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_tor_port'($*)) dnl
+
+ gen_require(`
+ type tor_port_t;
+ ')
+
+ allow $1 tor_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_tor_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the tor port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_tor_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_tor_port'($*)) dnl
+
+ gen_require(`
+ type tor_port_t;
+ ')
+
+ allow $1 tor_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_tor_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tor_client_packets'($*)) dnl
+
+ gen_require(`
+ type tor_client_packet_t;
+ ')
+
+ allow $1 tor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tor_client_packets'($*)) dnl
+
+ gen_require(`
+ type tor_client_packet_t;
+ ')
+
+ dontaudit $1 tor_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tor_client_packets'($*)) dnl
+
+ gen_require(`
+ type tor_client_packet_t;
+ ')
+
+ allow $1 tor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tor_client_packets'($*)) dnl
+
+ gen_require(`
+ type tor_client_packet_t;
+ ')
+
+ dontaudit $1 tor_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tor_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tor_client_packets'($*)) dnl
+
+ corenet_send_tor_client_packets($1)
+ corenet_receive_tor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tor_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tor_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_tor_client_packets($1)
+ corenet_dontaudit_receive_tor_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tor_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tor_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tor_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tor_client_packets'($*)) dnl
+
+ gen_require(`
+ type tor_client_packet_t;
+ ')
+
+ allow $1 tor_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tor_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send tor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_tor_server_packets'($*)) dnl
+
+ gen_require(`
+ type tor_server_packet_t;
+ ')
+
+ allow $1 tor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send tor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_tor_server_packets'($*)) dnl
+
+ gen_require(`
+ type tor_server_packet_t;
+ ')
+
+ dontaudit $1 tor_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive tor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_tor_server_packets'($*)) dnl
+
+ gen_require(`
+ type tor_server_packet_t;
+ ')
+
+ allow $1 tor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive tor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_tor_server_packets'($*)) dnl
+
+ gen_require(`
+ type tor_server_packet_t;
+ ')
+
+ dontaudit $1 tor_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive tor_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_tor_server_packets'($*)) dnl
+
+ corenet_send_tor_server_packets($1)
+ corenet_receive_tor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive tor_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_tor_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_tor_server_packets($1)
+ corenet_dontaudit_receive_tor_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_tor_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to tor_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_tor_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_tor_server_packets'($*)) dnl
+
+ gen_require(`
+ type tor_server_packet_t;
+ ')
+
+ allow $1 tor_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_tor_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the traceroute port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the traceroute port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the traceroute port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_traceroute_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_traceroute_port'($*)) dnl
+
+ gen_require(`
+ type traceroute_port_t;
+ ')
+
+ allow $1 traceroute_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_traceroute_port'($*)) dnl
+
+ gen_require(`
+ type traceroute_port_t;
+ ')
+
+ allow $1 traceroute_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_traceroute_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the traceroute port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_traceroute_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_traceroute_port'($*)) dnl
+
+ gen_require(`
+ type traceroute_port_t;
+ ')
+
+ allow $1 traceroute_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_traceroute_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send traceroute_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_traceroute_client_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_client_packet_t;
+ ')
+
+ allow $1 traceroute_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send traceroute_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_traceroute_client_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_client_packet_t;
+ ')
+
+ dontaudit $1 traceroute_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive traceroute_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_traceroute_client_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_client_packet_t;
+ ')
+
+ allow $1 traceroute_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive traceroute_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_traceroute_client_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_client_packet_t;
+ ')
+
+ dontaudit $1 traceroute_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive traceroute_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_traceroute_client_packets'($*)) dnl
+
+ corenet_send_traceroute_client_packets($1)
+ corenet_receive_traceroute_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive traceroute_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_traceroute_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_traceroute_client_packets($1)
+ corenet_dontaudit_receive_traceroute_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_traceroute_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to traceroute_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_traceroute_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_traceroute_client_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_client_packet_t;
+ ')
+
+ allow $1 traceroute_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_traceroute_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send traceroute_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_traceroute_server_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_server_packet_t;
+ ')
+
+ allow $1 traceroute_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send traceroute_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_traceroute_server_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_server_packet_t;
+ ')
+
+ dontaudit $1 traceroute_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive traceroute_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_traceroute_server_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_server_packet_t;
+ ')
+
+ allow $1 traceroute_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive traceroute_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_traceroute_server_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_server_packet_t;
+ ')
+
+ dontaudit $1 traceroute_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive traceroute_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_traceroute_server_packets'($*)) dnl
+
+ corenet_send_traceroute_server_packets($1)
+ corenet_receive_traceroute_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive traceroute_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_traceroute_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_traceroute_server_packets($1)
+ corenet_dontaudit_receive_traceroute_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_traceroute_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to traceroute_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_traceroute_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_traceroute_server_packets'($*)) dnl
+
+ gen_require(`
+ type traceroute_server_packet_t;
+ ')
+
+ allow $1 traceroute_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_traceroute_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the transproxy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the transproxy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the transproxy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_transproxy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_transproxy_port'($*)) dnl
+
+ gen_require(`
+ type transproxy_port_t;
+ ')
+
+ allow $1 transproxy_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_transproxy_port'($*)) dnl
+
+ gen_require(`
+ type transproxy_port_t;
+ ')
+
+ allow $1 transproxy_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_transproxy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the transproxy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_transproxy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_transproxy_port'($*)) dnl
+
+ gen_require(`
+ type transproxy_port_t;
+ ')
+
+ allow $1 transproxy_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_transproxy_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send transproxy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_transproxy_client_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_client_packet_t;
+ ')
+
+ allow $1 transproxy_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send transproxy_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_transproxy_client_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_client_packet_t;
+ ')
+
+ dontaudit $1 transproxy_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive transproxy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_transproxy_client_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_client_packet_t;
+ ')
+
+ allow $1 transproxy_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive transproxy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_transproxy_client_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_client_packet_t;
+ ')
+
+ dontaudit $1 transproxy_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive transproxy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_transproxy_client_packets'($*)) dnl
+
+ corenet_send_transproxy_client_packets($1)
+ corenet_receive_transproxy_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive transproxy_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_transproxy_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_transproxy_client_packets($1)
+ corenet_dontaudit_receive_transproxy_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_transproxy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to transproxy_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_transproxy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_transproxy_client_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_client_packet_t;
+ ')
+
+ allow $1 transproxy_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_transproxy_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send transproxy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_transproxy_server_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_server_packet_t;
+ ')
+
+ allow $1 transproxy_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send transproxy_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_transproxy_server_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_server_packet_t;
+ ')
+
+ dontaudit $1 transproxy_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive transproxy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_transproxy_server_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_server_packet_t;
+ ')
+
+ allow $1 transproxy_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive transproxy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_transproxy_server_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_server_packet_t;
+ ')
+
+ dontaudit $1 transproxy_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive transproxy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_transproxy_server_packets'($*)) dnl
+
+ corenet_send_transproxy_server_packets($1)
+ corenet_receive_transproxy_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive transproxy_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_transproxy_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_transproxy_server_packets($1)
+ corenet_dontaudit_receive_transproxy_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_transproxy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to transproxy_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_transproxy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_transproxy_server_packets'($*)) dnl
+
+ gen_require(`
+ type transproxy_server_packet_t;
+ ')
+
+ allow $1 transproxy_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_transproxy_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the trisoap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the trisoap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the trisoap port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_trisoap_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_trisoap_port'($*)) dnl
+
+ gen_require(`
+ type trisoap_port_t;
+ ')
+
+ allow $1 trisoap_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_trisoap_port'($*)) dnl
+
+ gen_require(`
+ type trisoap_port_t;
+ ')
+
+ allow $1 trisoap_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_trisoap_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the trisoap port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_trisoap_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_trisoap_port'($*)) dnl
+
+ gen_require(`
+ type trisoap_port_t;
+ ')
+
+ allow $1 trisoap_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_trisoap_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send trisoap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_trisoap_client_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_client_packet_t;
+ ')
+
+ allow $1 trisoap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send trisoap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trisoap_client_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_client_packet_t;
+ ')
+
+ dontaudit $1 trisoap_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive trisoap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_trisoap_client_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_client_packet_t;
+ ')
+
+ allow $1 trisoap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive trisoap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trisoap_client_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_client_packet_t;
+ ')
+
+ dontaudit $1 trisoap_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive trisoap_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trisoap_client_packets'($*)) dnl
+
+ corenet_send_trisoap_client_packets($1)
+ corenet_receive_trisoap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive trisoap_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trisoap_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_trisoap_client_packets($1)
+ corenet_dontaudit_receive_trisoap_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trisoap_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to trisoap_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_trisoap_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trisoap_client_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_client_packet_t;
+ ')
+
+ allow $1 trisoap_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_trisoap_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send trisoap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_trisoap_server_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_server_packet_t;
+ ')
+
+ allow $1 trisoap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send trisoap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trisoap_server_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_server_packet_t;
+ ')
+
+ dontaudit $1 trisoap_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive trisoap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_trisoap_server_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_server_packet_t;
+ ')
+
+ allow $1 trisoap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive trisoap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trisoap_server_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_server_packet_t;
+ ')
+
+ dontaudit $1 trisoap_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive trisoap_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trisoap_server_packets'($*)) dnl
+
+ corenet_send_trisoap_server_packets($1)
+ corenet_receive_trisoap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive trisoap_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trisoap_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_trisoap_server_packets($1)
+ corenet_dontaudit_receive_trisoap_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trisoap_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to trisoap_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_trisoap_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trisoap_server_packets'($*)) dnl
+
+ gen_require(`
+ type trisoap_server_packet_t;
+ ')
+
+ allow $1 trisoap_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_trisoap_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the trivnet1 port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_trivnet1_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_trivnet1_port'($*)) dnl
+
+ gen_require(`
+ type trivnet1_port_t;
+ ')
+
+ allow $1 trivnet1_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_trivnet1_port'($*)) dnl
+
+ gen_require(`
+ type trivnet1_port_t;
+ ')
+
+ allow $1 trivnet1_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_trivnet1_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the trivnet1 port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_trivnet1_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_trivnet1_port'($*)) dnl
+
+ gen_require(`
+ type trivnet1_port_t;
+ ')
+
+ allow $1 trivnet1_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_trivnet1_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send trivnet1_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_trivnet1_client_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_client_packet_t;
+ ')
+
+ allow $1 trivnet1_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send trivnet1_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trivnet1_client_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_client_packet_t;
+ ')
+
+ dontaudit $1 trivnet1_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive trivnet1_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_trivnet1_client_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_client_packet_t;
+ ')
+
+ allow $1 trivnet1_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive trivnet1_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trivnet1_client_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_client_packet_t;
+ ')
+
+ dontaudit $1 trivnet1_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive trivnet1_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trivnet1_client_packets'($*)) dnl
+
+ corenet_send_trivnet1_client_packets($1)
+ corenet_receive_trivnet1_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive trivnet1_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trivnet1_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_trivnet1_client_packets($1)
+ corenet_dontaudit_receive_trivnet1_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to trivnet1_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_trivnet1_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trivnet1_client_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_client_packet_t;
+ ')
+
+ allow $1 trivnet1_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_trivnet1_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send trivnet1_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_trivnet1_server_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_server_packet_t;
+ ')
+
+ allow $1 trivnet1_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send trivnet1_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_trivnet1_server_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_server_packet_t;
+ ')
+
+ dontaudit $1 trivnet1_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive trivnet1_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_trivnet1_server_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_server_packet_t;
+ ')
+
+ allow $1 trivnet1_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive trivnet1_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_trivnet1_server_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_server_packet_t;
+ ')
+
+ dontaudit $1 trivnet1_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive trivnet1_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_trivnet1_server_packets'($*)) dnl
+
+ corenet_send_trivnet1_server_packets($1)
+ corenet_receive_trivnet1_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive trivnet1_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_trivnet1_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_trivnet1_server_packets($1)
+ corenet_dontaudit_receive_trivnet1_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to trivnet1_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_trivnet1_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_trivnet1_server_packets'($*)) dnl
+
+ gen_require(`
+ type trivnet1_server_packet_t;
+ ')
+
+ allow $1 trivnet1_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_trivnet1_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the ups port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the ups port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the ups port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_ups_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_ups_port'($*)) dnl
+
+ gen_require(`
+ type ups_port_t;
+ ')
+
+ allow $1 ups_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_ups_port'($*)) dnl
+
+ gen_require(`
+ type ups_port_t;
+ ')
+
+ allow $1 ups_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_ups_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the ups port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_ups_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_ups_port'($*)) dnl
+
+ gen_require(`
+ type ups_port_t;
+ ')
+
+ allow $1 ups_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_ups_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ups_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ups_client_packets'($*)) dnl
+
+ gen_require(`
+ type ups_client_packet_t;
+ ')
+
+ allow $1 ups_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ups_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ups_client_packets'($*)) dnl
+
+ gen_require(`
+ type ups_client_packet_t;
+ ')
+
+ dontaudit $1 ups_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ups_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ups_client_packets'($*)) dnl
+
+ gen_require(`
+ type ups_client_packet_t;
+ ')
+
+ allow $1 ups_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ups_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ups_client_packets'($*)) dnl
+
+ gen_require(`
+ type ups_client_packet_t;
+ ')
+
+ dontaudit $1 ups_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ups_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ups_client_packets'($*)) dnl
+
+ corenet_send_ups_client_packets($1)
+ corenet_receive_ups_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ups_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ups_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_ups_client_packets($1)
+ corenet_dontaudit_receive_ups_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ups_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ups_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ups_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ups_client_packets'($*)) dnl
+
+ gen_require(`
+ type ups_client_packet_t;
+ ')
+
+ allow $1 ups_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ups_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send ups_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_ups_server_packets'($*)) dnl
+
+ gen_require(`
+ type ups_server_packet_t;
+ ')
+
+ allow $1 ups_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send ups_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_ups_server_packets'($*)) dnl
+
+ gen_require(`
+ type ups_server_packet_t;
+ ')
+
+ dontaudit $1 ups_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive ups_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_ups_server_packets'($*)) dnl
+
+ gen_require(`
+ type ups_server_packet_t;
+ ')
+
+ allow $1 ups_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive ups_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_ups_server_packets'($*)) dnl
+
+ gen_require(`
+ type ups_server_packet_t;
+ ')
+
+ dontaudit $1 ups_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive ups_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_ups_server_packets'($*)) dnl
+
+ corenet_send_ups_server_packets($1)
+ corenet_receive_ups_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive ups_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_ups_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_ups_server_packets($1)
+ corenet_dontaudit_receive_ups_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_ups_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to ups_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_ups_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_ups_server_packets'($*)) dnl
+
+ gen_require(`
+ type ups_server_packet_t;
+ ')
+
+ allow $1 ups_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_ups_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the utcpserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_utcpserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_utcpserver_port'($*)) dnl
+
+ gen_require(`
+ type utcpserver_port_t;
+ ')
+
+ allow $1 utcpserver_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_utcpserver_port'($*)) dnl
+
+ gen_require(`
+ type utcpserver_port_t;
+ ')
+
+ allow $1 utcpserver_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_utcpserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the utcpserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_utcpserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_utcpserver_port'($*)) dnl
+
+ gen_require(`
+ type utcpserver_port_t;
+ ')
+
+ allow $1 utcpserver_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_utcpserver_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send utcpserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_utcpserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_client_packet_t;
+ ')
+
+ allow $1 utcpserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send utcpserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_utcpserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_client_packet_t;
+ ')
+
+ dontaudit $1 utcpserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive utcpserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_utcpserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_client_packet_t;
+ ')
+
+ allow $1 utcpserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive utcpserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_utcpserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_client_packet_t;
+ ')
+
+ dontaudit $1 utcpserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive utcpserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_utcpserver_client_packets'($*)) dnl
+
+ corenet_send_utcpserver_client_packets($1)
+ corenet_receive_utcpserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive utcpserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_utcpserver_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_utcpserver_client_packets($1)
+ corenet_dontaudit_receive_utcpserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to utcpserver_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_utcpserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_utcpserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_client_packet_t;
+ ')
+
+ allow $1 utcpserver_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_utcpserver_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send utcpserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_utcpserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_server_packet_t;
+ ')
+
+ allow $1 utcpserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send utcpserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_utcpserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_server_packet_t;
+ ')
+
+ dontaudit $1 utcpserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive utcpserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_utcpserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_server_packet_t;
+ ')
+
+ allow $1 utcpserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive utcpserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_utcpserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_server_packet_t;
+ ')
+
+ dontaudit $1 utcpserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive utcpserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_utcpserver_server_packets'($*)) dnl
+
+ corenet_send_utcpserver_server_packets($1)
+ corenet_receive_utcpserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive utcpserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_utcpserver_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_utcpserver_server_packets($1)
+ corenet_dontaudit_receive_utcpserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to utcpserver_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_utcpserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_utcpserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type utcpserver_server_packet_t;
+ ')
+
+ allow $1 utcpserver_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_utcpserver_server_packets'($*)) dnl
+ ')
+
+
+ # no defined portcon
+
+
+########################################
+##
+## Send and receive TCP traffic on the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the uucpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the uucpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the uucpd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_uucpd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_uucpd_port'($*)) dnl
+
+ gen_require(`
+ type uucpd_port_t;
+ ')
+
+ allow $1 uucpd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_uucpd_port'($*)) dnl
+
+ gen_require(`
+ type uucpd_port_t;
+ ')
+
+ allow $1 uucpd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_uucpd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the uucpd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_uucpd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_uucpd_port'($*)) dnl
+
+ gen_require(`
+ type uucpd_port_t;
+ ')
+
+ allow $1 uucpd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_uucpd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send uucpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_uucpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_client_packet_t;
+ ')
+
+ allow $1 uucpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send uucpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_uucpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_client_packet_t;
+ ')
+
+ dontaudit $1 uucpd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive uucpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_uucpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_client_packet_t;
+ ')
+
+ allow $1 uucpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive uucpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_uucpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_client_packet_t;
+ ')
+
+ dontaudit $1 uucpd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive uucpd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_uucpd_client_packets'($*)) dnl
+
+ corenet_send_uucpd_client_packets($1)
+ corenet_receive_uucpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive uucpd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_uucpd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_uucpd_client_packets($1)
+ corenet_dontaudit_receive_uucpd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_uucpd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to uucpd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_uucpd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_uucpd_client_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_client_packet_t;
+ ')
+
+ allow $1 uucpd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_uucpd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send uucpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_uucpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_server_packet_t;
+ ')
+
+ allow $1 uucpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send uucpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_uucpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_server_packet_t;
+ ')
+
+ dontaudit $1 uucpd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive uucpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_uucpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_server_packet_t;
+ ')
+
+ allow $1 uucpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive uucpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_uucpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_server_packet_t;
+ ')
+
+ dontaudit $1 uucpd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive uucpd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_uucpd_server_packets'($*)) dnl
+
+ corenet_send_uucpd_server_packets($1)
+ corenet_receive_uucpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive uucpd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_uucpd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_uucpd_server_packets($1)
+ corenet_dontaudit_receive_uucpd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_uucpd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to uucpd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_uucpd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_uucpd_server_packets'($*)) dnl
+
+ gen_require(`
+ type uucpd_server_packet_t;
+ ')
+
+ allow $1 uucpd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_uucpd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the varnishd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the varnishd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the varnishd port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_varnishd_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_varnishd_port'($*)) dnl
+
+ gen_require(`
+ type varnishd_port_t;
+ ')
+
+ allow $1 varnishd_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_varnishd_port'($*)) dnl
+
+ gen_require(`
+ type varnishd_port_t;
+ ')
+
+ allow $1 varnishd_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_varnishd_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the varnishd port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_varnishd_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_varnishd_port'($*)) dnl
+
+ gen_require(`
+ type varnishd_port_t;
+ ')
+
+ allow $1 varnishd_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_varnishd_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send varnishd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_varnishd_client_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_client_packet_t;
+ ')
+
+ allow $1 varnishd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send varnishd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_varnishd_client_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_client_packet_t;
+ ')
+
+ dontaudit $1 varnishd_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive varnishd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_varnishd_client_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_client_packet_t;
+ ')
+
+ allow $1 varnishd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive varnishd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_varnishd_client_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_client_packet_t;
+ ')
+
+ dontaudit $1 varnishd_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive varnishd_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_varnishd_client_packets'($*)) dnl
+
+ corenet_send_varnishd_client_packets($1)
+ corenet_receive_varnishd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive varnishd_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_varnishd_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_varnishd_client_packets($1)
+ corenet_dontaudit_receive_varnishd_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_varnishd_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to varnishd_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_varnishd_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_varnishd_client_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_client_packet_t;
+ ')
+
+ allow $1 varnishd_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_varnishd_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send varnishd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_varnishd_server_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_server_packet_t;
+ ')
+
+ allow $1 varnishd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send varnishd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_varnishd_server_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_server_packet_t;
+ ')
+
+ dontaudit $1 varnishd_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive varnishd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_varnishd_server_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_server_packet_t;
+ ')
+
+ allow $1 varnishd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive varnishd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_varnishd_server_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_server_packet_t;
+ ')
+
+ dontaudit $1 varnishd_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive varnishd_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_varnishd_server_packets'($*)) dnl
+
+ corenet_send_varnishd_server_packets($1)
+ corenet_receive_varnishd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive varnishd_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_varnishd_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_varnishd_server_packets($1)
+ corenet_dontaudit_receive_varnishd_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_varnishd_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to varnishd_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_varnishd_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_varnishd_server_packets'($*)) dnl
+
+ gen_require(`
+ type varnishd_server_packet_t;
+ ')
+
+ allow $1 varnishd_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_varnishd_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the virt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the virt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the virt port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virt_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virt_port'($*)) dnl
+
+ gen_require(`
+ type virt_port_t;
+ ')
+
+ allow $1 virt_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virt_port'($*)) dnl
+
+ gen_require(`
+ type virt_port_t;
+ ')
+
+ allow $1 virt_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virt_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the virt port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_virt_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virt_port'($*)) dnl
+
+ gen_require(`
+ type virt_port_t;
+ ')
+
+ allow $1 virt_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virt_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virt_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_client_packet_t;
+ ')
+
+ allow $1 virt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_client_packet_t;
+ ')
+
+ dontaudit $1 virt_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_client_packet_t;
+ ')
+
+ allow $1 virt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_client_packet_t;
+ ')
+
+ dontaudit $1 virt_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virt_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_client_packets'($*)) dnl
+
+ corenet_send_virt_client_packets($1)
+ corenet_receive_virt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virt_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_virt_client_packets($1)
+ corenet_dontaudit_receive_virt_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virt_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virt_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_client_packet_t;
+ ')
+
+ allow $1 virt_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virt_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_server_packet_t;
+ ')
+
+ allow $1 virt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_server_packet_t;
+ ')
+
+ dontaudit $1 virt_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_server_packet_t;
+ ')
+
+ allow $1 virt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_server_packet_t;
+ ')
+
+ dontaudit $1 virt_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virt_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_server_packets'($*)) dnl
+
+ corenet_send_virt_server_packets($1)
+ corenet_receive_virt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virt_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_virt_server_packets($1)
+ corenet_dontaudit_receive_virt_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virt_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virt_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_server_packet_t;
+ ')
+
+ allow $1 virt_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the virtual_places port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virtual_places_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virtual_places_port'($*)) dnl
+
+ gen_require(`
+ type virtual_places_port_t;
+ ')
+
+ allow $1 virtual_places_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virtual_places_port'($*)) dnl
+
+ gen_require(`
+ type virtual_places_port_t;
+ ')
+
+ allow $1 virtual_places_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virtual_places_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the virtual_places port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_virtual_places_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virtual_places_port'($*)) dnl
+
+ gen_require(`
+ type virtual_places_port_t;
+ ')
+
+ allow $1 virtual_places_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virtual_places_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virtual_places_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virtual_places_client_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_client_packet_t;
+ ')
+
+ allow $1 virtual_places_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virtual_places_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virtual_places_client_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_client_packet_t;
+ ')
+
+ dontaudit $1 virtual_places_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virtual_places_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virtual_places_client_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_client_packet_t;
+ ')
+
+ allow $1 virtual_places_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virtual_places_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virtual_places_client_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_client_packet_t;
+ ')
+
+ dontaudit $1 virtual_places_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virtual_places_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virtual_places_client_packets'($*)) dnl
+
+ corenet_send_virtual_places_client_packets($1)
+ corenet_receive_virtual_places_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virtual_places_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virtual_places_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_virtual_places_client_packets($1)
+ corenet_dontaudit_receive_virtual_places_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virtual_places_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virtual_places_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virtual_places_client_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_client_packet_t;
+ ')
+
+ allow $1 virtual_places_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virtual_places_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virtual_places_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virtual_places_server_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_server_packet_t;
+ ')
+
+ allow $1 virtual_places_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virtual_places_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virtual_places_server_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_server_packet_t;
+ ')
+
+ dontaudit $1 virtual_places_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virtual_places_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virtual_places_server_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_server_packet_t;
+ ')
+
+ allow $1 virtual_places_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virtual_places_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virtual_places_server_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_server_packet_t;
+ ')
+
+ dontaudit $1 virtual_places_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virtual_places_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virtual_places_server_packets'($*)) dnl
+
+ corenet_send_virtual_places_server_packets($1)
+ corenet_receive_virtual_places_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virtual_places_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virtual_places_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_virtual_places_server_packets($1)
+ corenet_dontaudit_receive_virtual_places_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virtual_places_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virtual_places_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virtual_places_server_packets'($*)) dnl
+
+ gen_require(`
+ type virtual_places_server_packet_t;
+ ')
+
+ allow $1 virtual_places_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virtual_places_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the virt_migration port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_virt_migration_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_virt_migration_port'($*)) dnl
+
+ gen_require(`
+ type virt_migration_port_t;
+ ')
+
+ allow $1 virt_migration_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_virt_migration_port'($*)) dnl
+
+ gen_require(`
+ type virt_migration_port_t;
+ ')
+
+ allow $1 virt_migration_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_virt_migration_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the virt_migration port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_virt_migration_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_virt_migration_port'($*)) dnl
+
+ gen_require(`
+ type virt_migration_port_t;
+ ')
+
+ allow $1 virt_migration_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_virt_migration_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virt_migration_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virt_migration_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_client_packet_t;
+ ')
+
+ allow $1 virt_migration_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virt_migration_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_migration_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_client_packet_t;
+ ')
+
+ dontaudit $1 virt_migration_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virt_migration_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_migration_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_client_packet_t;
+ ')
+
+ allow $1 virt_migration_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virt_migration_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_migration_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_client_packet_t;
+ ')
+
+ dontaudit $1 virt_migration_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virt_migration_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_migration_client_packets'($*)) dnl
+
+ corenet_send_virt_migration_client_packets($1)
+ corenet_receive_virt_migration_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virt_migration_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_migration_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_virt_migration_client_packets($1)
+ corenet_dontaudit_receive_virt_migration_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virt_migration_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virt_migration_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_migration_client_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_client_packet_t;
+ ')
+
+ allow $1 virt_migration_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_migration_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send virt_migration_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_virt_migration_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_server_packet_t;
+ ')
+
+ allow $1 virt_migration_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send virt_migration_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_virt_migration_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_server_packet_t;
+ ')
+
+ dontaudit $1 virt_migration_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive virt_migration_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_virt_migration_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_server_packet_t;
+ ')
+
+ allow $1 virt_migration_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive virt_migration_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_virt_migration_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_server_packet_t;
+ ')
+
+ dontaudit $1 virt_migration_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive virt_migration_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_virt_migration_server_packets'($*)) dnl
+
+ corenet_send_virt_migration_server_packets($1)
+ corenet_receive_virt_migration_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive virt_migration_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_virt_migration_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_virt_migration_server_packets($1)
+ corenet_dontaudit_receive_virt_migration_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to virt_migration_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_virt_migration_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_virt_migration_server_packets'($*)) dnl
+
+ gen_require(`
+ type virt_migration_server_packet_t;
+ ')
+
+ allow $1 virt_migration_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_virt_migration_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the vnc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the vnc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the vnc port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_vnc_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_vnc_port'($*)) dnl
+
+ gen_require(`
+ type vnc_port_t;
+ ')
+
+ allow $1 vnc_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_vnc_port'($*)) dnl
+
+ gen_require(`
+ type vnc_port_t;
+ ')
+
+ allow $1 vnc_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_vnc_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the vnc port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_vnc_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_vnc_port'($*)) dnl
+
+ gen_require(`
+ type vnc_port_t;
+ ')
+
+ allow $1 vnc_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_vnc_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send vnc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_vnc_client_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_client_packet_t;
+ ')
+
+ allow $1 vnc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send vnc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_vnc_client_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_client_packet_t;
+ ')
+
+ dontaudit $1 vnc_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive vnc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_vnc_client_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_client_packet_t;
+ ')
+
+ allow $1 vnc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive vnc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_vnc_client_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_client_packet_t;
+ ')
+
+ dontaudit $1 vnc_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive vnc_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_vnc_client_packets'($*)) dnl
+
+ corenet_send_vnc_client_packets($1)
+ corenet_receive_vnc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive vnc_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_vnc_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_vnc_client_packets($1)
+ corenet_dontaudit_receive_vnc_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_vnc_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to vnc_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_vnc_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_vnc_client_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_client_packet_t;
+ ')
+
+ allow $1 vnc_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_vnc_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send vnc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_vnc_server_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_server_packet_t;
+ ')
+
+ allow $1 vnc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send vnc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_vnc_server_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_server_packet_t;
+ ')
+
+ dontaudit $1 vnc_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive vnc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_vnc_server_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_server_packet_t;
+ ')
+
+ allow $1 vnc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive vnc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_vnc_server_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_server_packet_t;
+ ')
+
+ dontaudit $1 vnc_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive vnc_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_vnc_server_packets'($*)) dnl
+
+ corenet_send_vnc_server_packets($1)
+ corenet_receive_vnc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive vnc_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_vnc_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_vnc_server_packets($1)
+ corenet_dontaudit_receive_vnc_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_vnc_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to vnc_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_vnc_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_vnc_server_packets'($*)) dnl
+
+ gen_require(`
+ type vnc_server_packet_t;
+ ')
+
+ allow $1 vnc_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_vnc_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the wccp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the wccp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the wccp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wccp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wccp_port'($*)) dnl
+
+ gen_require(`
+ type wccp_port_t;
+ ')
+
+ allow $1 wccp_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wccp_port'($*)) dnl
+
+ gen_require(`
+ type wccp_port_t;
+ ')
+
+ allow $1 wccp_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wccp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the wccp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_wccp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wccp_port'($*)) dnl
+
+ gen_require(`
+ type wccp_port_t;
+ ')
+
+ allow $1 wccp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wccp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wccp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wccp_client_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_client_packet_t;
+ ')
+
+ allow $1 wccp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wccp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wccp_client_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_client_packet_t;
+ ')
+
+ dontaudit $1 wccp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wccp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wccp_client_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_client_packet_t;
+ ')
+
+ allow $1 wccp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wccp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wccp_client_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_client_packet_t;
+ ')
+
+ dontaudit $1 wccp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wccp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wccp_client_packets'($*)) dnl
+
+ corenet_send_wccp_client_packets($1)
+ corenet_receive_wccp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wccp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wccp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_wccp_client_packets($1)
+ corenet_dontaudit_receive_wccp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wccp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wccp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wccp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wccp_client_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_client_packet_t;
+ ')
+
+ allow $1 wccp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wccp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wccp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wccp_server_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_server_packet_t;
+ ')
+
+ allow $1 wccp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wccp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wccp_server_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_server_packet_t;
+ ')
+
+ dontaudit $1 wccp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wccp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wccp_server_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_server_packet_t;
+ ')
+
+ allow $1 wccp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wccp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wccp_server_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_server_packet_t;
+ ')
+
+ dontaudit $1 wccp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wccp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wccp_server_packets'($*)) dnl
+
+ corenet_send_wccp_server_packets($1)
+ corenet_receive_wccp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wccp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wccp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_wccp_server_packets($1)
+ corenet_dontaudit_receive_wccp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wccp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wccp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wccp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wccp_server_packets'($*)) dnl
+
+ gen_require(`
+ type wccp_server_packet_t;
+ ')
+
+ allow $1 wccp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wccp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the websm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the websm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the websm port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_websm_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_websm_port'($*)) dnl
+
+ gen_require(`
+ type websm_port_t;
+ ')
+
+ allow $1 websm_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_websm_port'($*)) dnl
+
+ gen_require(`
+ type websm_port_t;
+ ')
+
+ allow $1 websm_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_websm_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the websm port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_websm_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_websm_port'($*)) dnl
+
+ gen_require(`
+ type websm_port_t;
+ ')
+
+ allow $1 websm_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_websm_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send websm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_websm_client_packets'($*)) dnl
+
+ gen_require(`
+ type websm_client_packet_t;
+ ')
+
+ allow $1 websm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send websm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_websm_client_packets'($*)) dnl
+
+ gen_require(`
+ type websm_client_packet_t;
+ ')
+
+ dontaudit $1 websm_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive websm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_websm_client_packets'($*)) dnl
+
+ gen_require(`
+ type websm_client_packet_t;
+ ')
+
+ allow $1 websm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive websm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_websm_client_packets'($*)) dnl
+
+ gen_require(`
+ type websm_client_packet_t;
+ ')
+
+ dontaudit $1 websm_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive websm_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_websm_client_packets'($*)) dnl
+
+ corenet_send_websm_client_packets($1)
+ corenet_receive_websm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive websm_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_websm_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_websm_client_packets($1)
+ corenet_dontaudit_receive_websm_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_websm_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to websm_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_websm_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_websm_client_packets'($*)) dnl
+
+ gen_require(`
+ type websm_client_packet_t;
+ ')
+
+ allow $1 websm_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_websm_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send websm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_websm_server_packets'($*)) dnl
+
+ gen_require(`
+ type websm_server_packet_t;
+ ')
+
+ allow $1 websm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send websm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_websm_server_packets'($*)) dnl
+
+ gen_require(`
+ type websm_server_packet_t;
+ ')
+
+ dontaudit $1 websm_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive websm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_websm_server_packets'($*)) dnl
+
+ gen_require(`
+ type websm_server_packet_t;
+ ')
+
+ allow $1 websm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive websm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_websm_server_packets'($*)) dnl
+
+ gen_require(`
+ type websm_server_packet_t;
+ ')
+
+ dontaudit $1 websm_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive websm_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_websm_server_packets'($*)) dnl
+
+ corenet_send_websm_server_packets($1)
+ corenet_receive_websm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive websm_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_websm_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_websm_server_packets($1)
+ corenet_dontaudit_receive_websm_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_websm_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to websm_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_websm_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_websm_server_packets'($*)) dnl
+
+ gen_require(`
+ type websm_server_packet_t;
+ ')
+
+ allow $1 websm_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_websm_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the whois port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the whois port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the whois port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_whois_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_whois_port'($*)) dnl
+
+ gen_require(`
+ type whois_port_t;
+ ')
+
+ allow $1 whois_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_whois_port'($*)) dnl
+
+ gen_require(`
+ type whois_port_t;
+ ')
+
+ allow $1 whois_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_whois_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the whois port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_whois_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_whois_port'($*)) dnl
+
+ gen_require(`
+ type whois_port_t;
+ ')
+
+ allow $1 whois_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_whois_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send whois_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_whois_client_packets'($*)) dnl
+
+ gen_require(`
+ type whois_client_packet_t;
+ ')
+
+ allow $1 whois_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send whois_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_whois_client_packets'($*)) dnl
+
+ gen_require(`
+ type whois_client_packet_t;
+ ')
+
+ dontaudit $1 whois_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive whois_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_whois_client_packets'($*)) dnl
+
+ gen_require(`
+ type whois_client_packet_t;
+ ')
+
+ allow $1 whois_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive whois_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_whois_client_packets'($*)) dnl
+
+ gen_require(`
+ type whois_client_packet_t;
+ ')
+
+ dontaudit $1 whois_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive whois_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_whois_client_packets'($*)) dnl
+
+ corenet_send_whois_client_packets($1)
+ corenet_receive_whois_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive whois_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_whois_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_whois_client_packets($1)
+ corenet_dontaudit_receive_whois_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_whois_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to whois_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_whois_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_whois_client_packets'($*)) dnl
+
+ gen_require(`
+ type whois_client_packet_t;
+ ')
+
+ allow $1 whois_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_whois_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send whois_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_whois_server_packets'($*)) dnl
+
+ gen_require(`
+ type whois_server_packet_t;
+ ')
+
+ allow $1 whois_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send whois_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_whois_server_packets'($*)) dnl
+
+ gen_require(`
+ type whois_server_packet_t;
+ ')
+
+ dontaudit $1 whois_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive whois_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_whois_server_packets'($*)) dnl
+
+ gen_require(`
+ type whois_server_packet_t;
+ ')
+
+ allow $1 whois_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive whois_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_whois_server_packets'($*)) dnl
+
+ gen_require(`
+ type whois_server_packet_t;
+ ')
+
+ dontaudit $1 whois_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive whois_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_whois_server_packets'($*)) dnl
+
+ corenet_send_whois_server_packets($1)
+ corenet_receive_whois_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive whois_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_whois_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_whois_server_packets($1)
+ corenet_dontaudit_receive_whois_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_whois_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to whois_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_whois_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_whois_server_packets'($*)) dnl
+
+ gen_require(`
+ type whois_server_packet_t;
+ ')
+
+ allow $1 whois_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_whois_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the winshadow port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the winshadow port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the winshadow port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_winshadow_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_winshadow_port'($*)) dnl
+
+ gen_require(`
+ type winshadow_port_t;
+ ')
+
+ allow $1 winshadow_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_winshadow_port'($*)) dnl
+
+ gen_require(`
+ type winshadow_port_t;
+ ')
+
+ allow $1 winshadow_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_winshadow_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the winshadow port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_winshadow_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_winshadow_port'($*)) dnl
+
+ gen_require(`
+ type winshadow_port_t;
+ ')
+
+ allow $1 winshadow_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_winshadow_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send winshadow_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_winshadow_client_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_client_packet_t;
+ ')
+
+ allow $1 winshadow_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send winshadow_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_winshadow_client_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_client_packet_t;
+ ')
+
+ dontaudit $1 winshadow_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive winshadow_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_winshadow_client_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_client_packet_t;
+ ')
+
+ allow $1 winshadow_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive winshadow_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_winshadow_client_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_client_packet_t;
+ ')
+
+ dontaudit $1 winshadow_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive winshadow_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_winshadow_client_packets'($*)) dnl
+
+ corenet_send_winshadow_client_packets($1)
+ corenet_receive_winshadow_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive winshadow_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_winshadow_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_winshadow_client_packets($1)
+ corenet_dontaudit_receive_winshadow_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_winshadow_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to winshadow_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_winshadow_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_winshadow_client_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_client_packet_t;
+ ')
+
+ allow $1 winshadow_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_winshadow_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send winshadow_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_winshadow_server_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_server_packet_t;
+ ')
+
+ allow $1 winshadow_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send winshadow_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_winshadow_server_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_server_packet_t;
+ ')
+
+ dontaudit $1 winshadow_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive winshadow_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_winshadow_server_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_server_packet_t;
+ ')
+
+ allow $1 winshadow_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive winshadow_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_winshadow_server_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_server_packet_t;
+ ')
+
+ dontaudit $1 winshadow_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive winshadow_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_winshadow_server_packets'($*)) dnl
+
+ corenet_send_winshadow_server_packets($1)
+ corenet_receive_winshadow_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive winshadow_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_winshadow_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_winshadow_server_packets($1)
+ corenet_dontaudit_receive_winshadow_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_winshadow_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to winshadow_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_winshadow_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_winshadow_server_packets'($*)) dnl
+
+ gen_require(`
+ type winshadow_server_packet_t;
+ ')
+
+ allow $1 winshadow_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_winshadow_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the wsdapi port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wsdapi_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wsdapi_port'($*)) dnl
+
+ gen_require(`
+ type wsdapi_port_t;
+ ')
+
+ allow $1 wsdapi_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wsdapi_port'($*)) dnl
+
+ gen_require(`
+ type wsdapi_port_t;
+ ')
+
+ allow $1 wsdapi_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wsdapi_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the wsdapi port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_wsdapi_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wsdapi_port'($*)) dnl
+
+ gen_require(`
+ type wsdapi_port_t;
+ ')
+
+ allow $1 wsdapi_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wsdapi_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wsdapi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wsdapi_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_client_packet_t;
+ ')
+
+ allow $1 wsdapi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wsdapi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsdapi_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_client_packet_t;
+ ')
+
+ dontaudit $1 wsdapi_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wsdapi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wsdapi_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_client_packet_t;
+ ')
+
+ allow $1 wsdapi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wsdapi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsdapi_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_client_packet_t;
+ ')
+
+ dontaudit $1 wsdapi_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wsdapi_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsdapi_client_packets'($*)) dnl
+
+ corenet_send_wsdapi_client_packets($1)
+ corenet_receive_wsdapi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wsdapi_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsdapi_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_wsdapi_client_packets($1)
+ corenet_dontaudit_receive_wsdapi_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wsdapi_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wsdapi_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsdapi_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_client_packet_t;
+ ')
+
+ allow $1 wsdapi_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsdapi_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wsdapi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wsdapi_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_server_packet_t;
+ ')
+
+ allow $1 wsdapi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wsdapi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsdapi_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_server_packet_t;
+ ')
+
+ dontaudit $1 wsdapi_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wsdapi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wsdapi_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_server_packet_t;
+ ')
+
+ allow $1 wsdapi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wsdapi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsdapi_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_server_packet_t;
+ ')
+
+ dontaudit $1 wsdapi_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wsdapi_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsdapi_server_packets'($*)) dnl
+
+ corenet_send_wsdapi_server_packets($1)
+ corenet_receive_wsdapi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wsdapi_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsdapi_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_wsdapi_server_packets($1)
+ corenet_dontaudit_receive_wsdapi_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wsdapi_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wsdapi_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsdapi_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsdapi_server_packet_t;
+ ')
+
+ allow $1 wsdapi_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsdapi_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the wsicopy port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_wsicopy_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_wsicopy_port'($*)) dnl
+
+ gen_require(`
+ type wsicopy_port_t;
+ ')
+
+ allow $1 wsicopy_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_wsicopy_port'($*)) dnl
+
+ gen_require(`
+ type wsicopy_port_t;
+ ')
+
+ allow $1 wsicopy_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_wsicopy_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the wsicopy port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_wsicopy_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_wsicopy_port'($*)) dnl
+
+ gen_require(`
+ type wsicopy_port_t;
+ ')
+
+ allow $1 wsicopy_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_wsicopy_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wsicopy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wsicopy_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_client_packet_t;
+ ')
+
+ allow $1 wsicopy_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wsicopy_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsicopy_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_client_packet_t;
+ ')
+
+ dontaudit $1 wsicopy_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wsicopy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wsicopy_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_client_packet_t;
+ ')
+
+ allow $1 wsicopy_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wsicopy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsicopy_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_client_packet_t;
+ ')
+
+ dontaudit $1 wsicopy_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wsicopy_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsicopy_client_packets'($*)) dnl
+
+ corenet_send_wsicopy_client_packets($1)
+ corenet_receive_wsicopy_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wsicopy_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsicopy_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_wsicopy_client_packets($1)
+ corenet_dontaudit_receive_wsicopy_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wsicopy_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wsicopy_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsicopy_client_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_client_packet_t;
+ ')
+
+ allow $1 wsicopy_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsicopy_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send wsicopy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_wsicopy_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_server_packet_t;
+ ')
+
+ allow $1 wsicopy_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send wsicopy_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_wsicopy_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_server_packet_t;
+ ')
+
+ dontaudit $1 wsicopy_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive wsicopy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_wsicopy_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_server_packet_t;
+ ')
+
+ allow $1 wsicopy_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive wsicopy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_wsicopy_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_server_packet_t;
+ ')
+
+ dontaudit $1 wsicopy_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive wsicopy_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_wsicopy_server_packets'($*)) dnl
+
+ corenet_send_wsicopy_server_packets($1)
+ corenet_receive_wsicopy_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive wsicopy_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_wsicopy_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_wsicopy_server_packets($1)
+ corenet_dontaudit_receive_wsicopy_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to wsicopy_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_wsicopy_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_wsicopy_server_packets'($*)) dnl
+
+ gen_require(`
+ type wsicopy_server_packet_t;
+ ')
+
+ allow $1 wsicopy_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_wsicopy_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the xdmcp port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xdmcp_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xdmcp_port'($*)) dnl
+
+ gen_require(`
+ type xdmcp_port_t;
+ ')
+
+ allow $1 xdmcp_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xdmcp_port'($*)) dnl
+
+ gen_require(`
+ type xdmcp_port_t;
+ ')
+
+ allow $1 xdmcp_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xdmcp_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the xdmcp port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_xdmcp_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xdmcp_port'($*)) dnl
+
+ gen_require(`
+ type xdmcp_port_t;
+ ')
+
+ allow $1 xdmcp_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xdmcp_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xdmcp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xdmcp_client_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_client_packet_t;
+ ')
+
+ allow $1 xdmcp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xdmcp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xdmcp_client_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_client_packet_t;
+ ')
+
+ dontaudit $1 xdmcp_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xdmcp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xdmcp_client_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_client_packet_t;
+ ')
+
+ allow $1 xdmcp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xdmcp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xdmcp_client_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_client_packet_t;
+ ')
+
+ dontaudit $1 xdmcp_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xdmcp_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xdmcp_client_packets'($*)) dnl
+
+ corenet_send_xdmcp_client_packets($1)
+ corenet_receive_xdmcp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xdmcp_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xdmcp_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_xdmcp_client_packets($1)
+ corenet_dontaudit_receive_xdmcp_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xdmcp_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xdmcp_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xdmcp_client_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_client_packet_t;
+ ')
+
+ allow $1 xdmcp_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xdmcp_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xdmcp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xdmcp_server_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_server_packet_t;
+ ')
+
+ allow $1 xdmcp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xdmcp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xdmcp_server_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_server_packet_t;
+ ')
+
+ dontaudit $1 xdmcp_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xdmcp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xdmcp_server_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_server_packet_t;
+ ')
+
+ allow $1 xdmcp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xdmcp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xdmcp_server_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_server_packet_t;
+ ')
+
+ dontaudit $1 xdmcp_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xdmcp_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xdmcp_server_packets'($*)) dnl
+
+ corenet_send_xdmcp_server_packets($1)
+ corenet_receive_xdmcp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xdmcp_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xdmcp_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_xdmcp_server_packets($1)
+ corenet_dontaudit_receive_xdmcp_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xdmcp_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xdmcp_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xdmcp_server_packets'($*)) dnl
+
+ gen_require(`
+ type xdmcp_server_packet_t;
+ ')
+
+ allow $1 xdmcp_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xdmcp_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the xen port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the xen port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the xen port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xen_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xen_port'($*)) dnl
+
+ gen_require(`
+ type xen_port_t;
+ ')
+
+ allow $1 xen_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xen_port'($*)) dnl
+
+ gen_require(`
+ type xen_port_t;
+ ')
+
+ allow $1 xen_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xen_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the xen port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_xen_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xen_port'($*)) dnl
+
+ gen_require(`
+ type xen_port_t;
+ ')
+
+ allow $1 xen_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xen_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xen_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xen_client_packets'($*)) dnl
+
+ gen_require(`
+ type xen_client_packet_t;
+ ')
+
+ allow $1 xen_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xen_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xen_client_packets'($*)) dnl
+
+ gen_require(`
+ type xen_client_packet_t;
+ ')
+
+ dontaudit $1 xen_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xen_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xen_client_packets'($*)) dnl
+
+ gen_require(`
+ type xen_client_packet_t;
+ ')
+
+ allow $1 xen_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xen_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xen_client_packets'($*)) dnl
+
+ gen_require(`
+ type xen_client_packet_t;
+ ')
+
+ dontaudit $1 xen_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xen_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xen_client_packets'($*)) dnl
+
+ corenet_send_xen_client_packets($1)
+ corenet_receive_xen_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xen_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xen_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_xen_client_packets($1)
+ corenet_dontaudit_receive_xen_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xen_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xen_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xen_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xen_client_packets'($*)) dnl
+
+ gen_require(`
+ type xen_client_packet_t;
+ ')
+
+ allow $1 xen_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xen_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xen_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xen_server_packets'($*)) dnl
+
+ gen_require(`
+ type xen_server_packet_t;
+ ')
+
+ allow $1 xen_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xen_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xen_server_packets'($*)) dnl
+
+ gen_require(`
+ type xen_server_packet_t;
+ ')
+
+ dontaudit $1 xen_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xen_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xen_server_packets'($*)) dnl
+
+ gen_require(`
+ type xen_server_packet_t;
+ ')
+
+ allow $1 xen_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xen_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xen_server_packets'($*)) dnl
+
+ gen_require(`
+ type xen_server_packet_t;
+ ')
+
+ dontaudit $1 xen_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xen_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xen_server_packets'($*)) dnl
+
+ corenet_send_xen_server_packets($1)
+ corenet_receive_xen_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xen_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xen_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_xen_server_packets($1)
+ corenet_dontaudit_receive_xen_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xen_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xen_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xen_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xen_server_packets'($*)) dnl
+
+ gen_require(`
+ type xen_server_packet_t;
+ ')
+
+ allow $1 xen_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xen_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the xfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the xfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the xfs port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xfs_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xfs_port'($*)) dnl
+
+ gen_require(`
+ type xfs_port_t;
+ ')
+
+ allow $1 xfs_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xfs_port'($*)) dnl
+
+ gen_require(`
+ type xfs_port_t;
+ ')
+
+ allow $1 xfs_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xfs_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the xfs port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_xfs_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xfs_port'($*)) dnl
+
+ gen_require(`
+ type xfs_port_t;
+ ')
+
+ allow $1 xfs_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xfs_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_client_packet_t;
+ ')
+
+ allow $1 xfs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xfs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_client_packet_t;
+ ')
+
+ dontaudit $1 xfs_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_client_packet_t;
+ ')
+
+ allow $1 xfs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_client_packet_t;
+ ')
+
+ dontaudit $1 xfs_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xfs_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xfs_client_packets'($*)) dnl
+
+ corenet_send_xfs_client_packets($1)
+ corenet_receive_xfs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xfs_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xfs_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_xfs_client_packets($1)
+ corenet_dontaudit_receive_xfs_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xfs_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xfs_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xfs_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xfs_client_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_client_packet_t;
+ ')
+
+ allow $1 xfs_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xfs_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_server_packet_t;
+ ')
+
+ allow $1 xfs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xfs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_server_packet_t;
+ ')
+
+ dontaudit $1 xfs_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_server_packet_t;
+ ')
+
+ allow $1 xfs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_server_packet_t;
+ ')
+
+ dontaudit $1 xfs_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xfs_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xfs_server_packets'($*)) dnl
+
+ corenet_send_xfs_server_packets($1)
+ corenet_receive_xfs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xfs_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xfs_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_xfs_server_packets($1)
+ corenet_dontaudit_receive_xfs_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xfs_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xfs_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xfs_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xfs_server_packets'($*)) dnl
+
+ gen_require(`
+ type xfs_server_packet_t;
+ ')
+
+ allow $1 xfs_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xfs_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the xserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the xserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the xserver port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_xserver_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_xserver_port'($*)) dnl
+
+ gen_require(`
+ type xserver_port_t;
+ ')
+
+ allow $1 xserver_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_xserver_port'($*)) dnl
+
+ gen_require(`
+ type xserver_port_t;
+ ')
+
+ allow $1 xserver_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_xserver_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the xserver port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_xserver_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_xserver_port'($*)) dnl
+
+ gen_require(`
+ type xserver_port_t;
+ ')
+
+ allow $1 xserver_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_xserver_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_client_packet_t;
+ ')
+
+ allow $1 xserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_client_packet_t;
+ ')
+
+ dontaudit $1 xserver_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_client_packet_t;
+ ')
+
+ allow $1 xserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_client_packet_t;
+ ')
+
+ dontaudit $1 xserver_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xserver_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xserver_client_packets'($*)) dnl
+
+ corenet_send_xserver_client_packets($1)
+ corenet_receive_xserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xserver_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xserver_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_xserver_client_packets($1)
+ corenet_dontaudit_receive_xserver_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xserver_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xserver_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xserver_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xserver_client_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_client_packet_t;
+ ')
+
+ allow $1 xserver_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xserver_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send xserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_xserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_server_packet_t;
+ ')
+
+ allow $1 xserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send xserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_xserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_server_packet_t;
+ ')
+
+ dontaudit $1 xserver_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive xserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_xserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_server_packet_t;
+ ')
+
+ allow $1 xserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive xserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_xserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_server_packet_t;
+ ')
+
+ dontaudit $1 xserver_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive xserver_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_xserver_server_packets'($*)) dnl
+
+ corenet_send_xserver_server_packets($1)
+ corenet_receive_xserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive xserver_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_xserver_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_xserver_server_packets($1)
+ corenet_dontaudit_receive_xserver_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_xserver_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to xserver_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_xserver_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_xserver_server_packets'($*)) dnl
+
+ gen_require(`
+ type xserver_server_packet_t;
+ ')
+
+ allow $1 xserver_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_xserver_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zarafa port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zarafa port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zarafa port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zarafa_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zarafa_port'($*)) dnl
+
+ gen_require(`
+ type zarafa_port_t;
+ ')
+
+ allow $1 zarafa_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zarafa_port'($*)) dnl
+
+ gen_require(`
+ type zarafa_port_t;
+ ')
+
+ allow $1 zarafa_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zarafa_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zarafa port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zarafa_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zarafa_port'($*)) dnl
+
+ gen_require(`
+ type zarafa_port_t;
+ ')
+
+ allow $1 zarafa_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zarafa_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zarafa_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zarafa_client_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_client_packet_t;
+ ')
+
+ allow $1 zarafa_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zarafa_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zarafa_client_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_client_packet_t;
+ ')
+
+ dontaudit $1 zarafa_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zarafa_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zarafa_client_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_client_packet_t;
+ ')
+
+ allow $1 zarafa_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zarafa_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zarafa_client_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_client_packet_t;
+ ')
+
+ dontaudit $1 zarafa_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zarafa_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zarafa_client_packets'($*)) dnl
+
+ corenet_send_zarafa_client_packets($1)
+ corenet_receive_zarafa_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zarafa_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zarafa_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zarafa_client_packets($1)
+ corenet_dontaudit_receive_zarafa_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zarafa_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zarafa_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zarafa_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zarafa_client_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_client_packet_t;
+ ')
+
+ allow $1 zarafa_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zarafa_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zarafa_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zarafa_server_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_server_packet_t;
+ ')
+
+ allow $1 zarafa_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zarafa_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zarafa_server_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_server_packet_t;
+ ')
+
+ dontaudit $1 zarafa_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zarafa_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zarafa_server_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_server_packet_t;
+ ')
+
+ allow $1 zarafa_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zarafa_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zarafa_server_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_server_packet_t;
+ ')
+
+ dontaudit $1 zarafa_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zarafa_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zarafa_server_packets'($*)) dnl
+
+ corenet_send_zarafa_server_packets($1)
+ corenet_receive_zarafa_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zarafa_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zarafa_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zarafa_server_packets($1)
+ corenet_dontaudit_receive_zarafa_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zarafa_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zarafa_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zarafa_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zarafa_server_packets'($*)) dnl
+
+ gen_require(`
+ type zarafa_server_packet_t;
+ ')
+
+ allow $1 zarafa_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zarafa_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zabbix port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zabbix port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zabbix port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zabbix_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zabbix_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_port_t;
+ ')
+
+ allow $1 zabbix_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zabbix_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_port_t;
+ ')
+
+ allow $1 zabbix_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zabbix_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zabbix port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zabbix_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zabbix_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_port_t;
+ ')
+
+ allow $1 zabbix_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zabbix_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zabbix_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_client_packet_t;
+ ')
+
+ allow $1 zabbix_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zabbix_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_client_packet_t;
+ ')
+
+ dontaudit $1 zabbix_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zabbix_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_client_packet_t;
+ ')
+
+ allow $1 zabbix_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zabbix_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_client_packet_t;
+ ')
+
+ dontaudit $1 zabbix_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zabbix_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_client_packets'($*)) dnl
+
+ corenet_send_zabbix_client_packets($1)
+ corenet_receive_zabbix_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zabbix_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zabbix_client_packets($1)
+ corenet_dontaudit_receive_zabbix_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zabbix_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zabbix_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_client_packet_t;
+ ')
+
+ allow $1 zabbix_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zabbix_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_server_packet_t;
+ ')
+
+ allow $1 zabbix_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zabbix_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_server_packet_t;
+ ')
+
+ dontaudit $1 zabbix_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zabbix_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_server_packet_t;
+ ')
+
+ allow $1 zabbix_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zabbix_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_server_packet_t;
+ ')
+
+ dontaudit $1 zabbix_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zabbix_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_server_packets'($*)) dnl
+
+ corenet_send_zabbix_server_packets($1)
+ corenet_receive_zabbix_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zabbix_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zabbix_server_packets($1)
+ corenet_dontaudit_receive_zabbix_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zabbix_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zabbix_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_server_packet_t;
+ ')
+
+ allow $1 zabbix_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zabbix_agent port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zabbix_agent_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zabbix_agent_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_port_t;
+ ')
+
+ allow $1 zabbix_agent_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zabbix_agent_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_port_t;
+ ')
+
+ allow $1 zabbix_agent_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zabbix_agent_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zabbix_agent port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zabbix_agent_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zabbix_agent_port'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_port_t;
+ ')
+
+ allow $1 zabbix_agent_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zabbix_agent_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zabbix_agent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_agent_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_client_packet_t;
+ ')
+
+ allow $1 zabbix_agent_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zabbix_agent_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_agent_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_client_packet_t;
+ ')
+
+ dontaudit $1 zabbix_agent_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zabbix_agent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_agent_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_client_packet_t;
+ ')
+
+ allow $1 zabbix_agent_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zabbix_agent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_agent_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_client_packet_t;
+ ')
+
+ dontaudit $1 zabbix_agent_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zabbix_agent_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_agent_client_packets'($*)) dnl
+
+ corenet_send_zabbix_agent_client_packets($1)
+ corenet_receive_zabbix_agent_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zabbix_agent_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_agent_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zabbix_agent_client_packets($1)
+ corenet_dontaudit_receive_zabbix_agent_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zabbix_agent_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zabbix_agent_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_agent_client_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_client_packet_t;
+ ')
+
+ allow $1 zabbix_agent_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_agent_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zabbix_agent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zabbix_agent_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_server_packet_t;
+ ')
+
+ allow $1 zabbix_agent_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zabbix_agent_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zabbix_agent_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_server_packet_t;
+ ')
+
+ dontaudit $1 zabbix_agent_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zabbix_agent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zabbix_agent_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_server_packet_t;
+ ')
+
+ allow $1 zabbix_agent_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zabbix_agent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zabbix_agent_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_server_packet_t;
+ ')
+
+ dontaudit $1 zabbix_agent_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zabbix_agent_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zabbix_agent_server_packets'($*)) dnl
+
+ corenet_send_zabbix_agent_server_packets($1)
+ corenet_receive_zabbix_agent_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zabbix_agent_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zabbix_agent_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zabbix_agent_server_packets($1)
+ corenet_dontaudit_receive_zabbix_agent_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zabbix_agent_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zabbix_agent_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zabbix_agent_server_packets'($*)) dnl
+
+ gen_require(`
+ type zabbix_agent_server_packet_t;
+ ')
+
+ allow $1 zabbix_agent_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zabbix_agent_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zookeeper_client port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_client_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_client_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_port_t;
+ ')
+
+ allow $1 zookeeper_client_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_client_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_port_t;
+ ')
+
+ allow $1 zookeeper_client_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_client_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zookeeper_client port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zookeeper_client_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_client_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_port_t;
+ ')
+
+ allow $1 zookeeper_client_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_client_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_client_packet_t;
+ ')
+
+ allow $1 zookeeper_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_client_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_client_packet_t;
+ ')
+
+ allow $1 zookeeper_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_client_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_client_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_client_client_packets'($*)) dnl
+
+ corenet_send_zookeeper_client_client_packets($1)
+ corenet_receive_zookeeper_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_client_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_client_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_client_client_packets($1)
+ corenet_dontaudit_receive_zookeeper_client_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_client_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_client_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_client_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_client_packet_t;
+ ')
+
+ allow $1 zookeeper_client_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_client_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_server_packet_t;
+ ')
+
+ allow $1 zookeeper_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_client_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_server_packet_t;
+ ')
+
+ allow $1 zookeeper_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_client_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_client_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_client_server_packets'($*)) dnl
+
+ corenet_send_zookeeper_client_server_packets($1)
+ corenet_receive_zookeeper_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_client_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_client_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_client_server_packets($1)
+ corenet_dontaudit_receive_zookeeper_client_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_client_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_client_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_client_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_client_server_packet_t;
+ ')
+
+ allow $1 zookeeper_client_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_client_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zookeeper_election port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_election_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_election_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_port_t;
+ ')
+
+ allow $1 zookeeper_election_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_election_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_port_t;
+ ')
+
+ allow $1 zookeeper_election_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_election_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zookeeper_election port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zookeeper_election_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_election_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_port_t;
+ ')
+
+ allow $1 zookeeper_election_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_election_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_election_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_election_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_client_packet_t;
+ ')
+
+ allow $1 zookeeper_election_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_election_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_election_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_election_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_election_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_election_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_client_packet_t;
+ ')
+
+ allow $1 zookeeper_election_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_election_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_election_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_election_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_election_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_election_client_packets'($*)) dnl
+
+ corenet_send_zookeeper_election_client_packets($1)
+ corenet_receive_zookeeper_election_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_election_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_election_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_election_client_packets($1)
+ corenet_dontaudit_receive_zookeeper_election_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_election_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_election_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_election_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_client_packet_t;
+ ')
+
+ allow $1 zookeeper_election_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_election_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_election_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_election_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_server_packet_t;
+ ')
+
+ allow $1 zookeeper_election_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_election_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_election_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_election_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_election_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_election_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_server_packet_t;
+ ')
+
+ allow $1 zookeeper_election_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_election_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_election_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_election_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_election_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_election_server_packets'($*)) dnl
+
+ corenet_send_zookeeper_election_server_packets($1)
+ corenet_receive_zookeeper_election_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_election_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_election_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_election_server_packets($1)
+ corenet_dontaudit_receive_zookeeper_election_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_election_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_election_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_election_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_election_server_packet_t;
+ ')
+
+ allow $1 zookeeper_election_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_election_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zookeeper_leader port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zookeeper_leader_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zookeeper_leader_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_port_t;
+ ')
+
+ allow $1 zookeeper_leader_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zookeeper_leader_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_port_t;
+ ')
+
+ allow $1 zookeeper_leader_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zookeeper_leader port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zookeeper_leader_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zookeeper_leader_port'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_port_t;
+ ')
+
+ allow $1 zookeeper_leader_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zookeeper_leader_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_leader_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_leader_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_client_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_leader_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_leader_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_leader_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_leader_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_leader_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_client_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_leader_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_leader_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_client_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_leader_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_leader_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_leader_client_packets'($*)) dnl
+
+ corenet_send_zookeeper_leader_client_packets($1)
+ corenet_receive_zookeeper_leader_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_leader_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_leader_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_leader_client_packets($1)
+ corenet_dontaudit_receive_zookeeper_leader_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_leader_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_leader_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_leader_client_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_client_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_leader_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zookeeper_leader_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zookeeper_leader_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_server_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zookeeper_leader_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zookeeper_leader_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_leader_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zookeeper_leader_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zookeeper_leader_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_server_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zookeeper_leader_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zookeeper_leader_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_server_packet_t;
+ ')
+
+ dontaudit $1 zookeeper_leader_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zookeeper_leader_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zookeeper_leader_server_packets'($*)) dnl
+
+ corenet_send_zookeeper_leader_server_packets($1)
+ corenet_receive_zookeeper_leader_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zookeeper_leader_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zookeeper_leader_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zookeeper_leader_server_packets($1)
+ corenet_dontaudit_receive_zookeeper_leader_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zookeeper_leader_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zookeeper_leader_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zookeeper_leader_server_packets'($*)) dnl
+
+ gen_require(`
+ type zookeeper_leader_server_packet_t;
+ ')
+
+ allow $1 zookeeper_leader_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zookeeper_leader_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zebra port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zebra port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zebra port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zebra_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zebra_port'($*)) dnl
+
+ gen_require(`
+ type zebra_port_t;
+ ')
+
+ allow $1 zebra_port_t:tcp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zebra_port'($*)) dnl
+
+ gen_require(`
+ type zebra_port_t;
+ ')
+
+ allow $1 zebra_port_t:udp_socket name_bind;
+ allow $1 self:capability net_bind_service;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zebra_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zebra port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zebra_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zebra_port'($*)) dnl
+
+ gen_require(`
+ type zebra_port_t;
+ ')
+
+ allow $1 zebra_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zebra_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zebra_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zebra_client_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_client_packet_t;
+ ')
+
+ allow $1 zebra_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zebra_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zebra_client_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_client_packet_t;
+ ')
+
+ dontaudit $1 zebra_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zebra_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zebra_client_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_client_packet_t;
+ ')
+
+ allow $1 zebra_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zebra_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zebra_client_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_client_packet_t;
+ ')
+
+ dontaudit $1 zebra_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zebra_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zebra_client_packets'($*)) dnl
+
+ corenet_send_zebra_client_packets($1)
+ corenet_receive_zebra_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zebra_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zebra_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zebra_client_packets($1)
+ corenet_dontaudit_receive_zebra_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zebra_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zebra_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zebra_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zebra_client_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_client_packet_t;
+ ')
+
+ allow $1 zebra_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zebra_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zebra_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zebra_server_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_server_packet_t;
+ ')
+
+ allow $1 zebra_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zebra_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zebra_server_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_server_packet_t;
+ ')
+
+ dontaudit $1 zebra_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zebra_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zebra_server_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_server_packet_t;
+ ')
+
+ allow $1 zebra_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zebra_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zebra_server_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_server_packet_t;
+ ')
+
+ dontaudit $1 zebra_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zebra_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zebra_server_packets'($*)) dnl
+
+ corenet_send_zebra_server_packets($1)
+ corenet_receive_zebra_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zebra_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zebra_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zebra_server_packets($1)
+ corenet_dontaudit_receive_zebra_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zebra_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zebra_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zebra_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zebra_server_packets'($*)) dnl
+
+ gen_require(`
+ type zebra_server_packet_t;
+ ')
+
+ allow $1 zebra_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zebra_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zented port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zented port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zented port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zented_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zented_port'($*)) dnl
+
+ gen_require(`
+ type zented_port_t;
+ ')
+
+ allow $1 zented_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zented_port'($*)) dnl
+
+ gen_require(`
+ type zented_port_t;
+ ')
+
+ allow $1 zented_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zented_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zented port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zented_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zented_port'($*)) dnl
+
+ gen_require(`
+ type zented_port_t;
+ ')
+
+ allow $1 zented_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zented_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zented_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zented_client_packets'($*)) dnl
+
+ gen_require(`
+ type zented_client_packet_t;
+ ')
+
+ allow $1 zented_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zented_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zented_client_packets'($*)) dnl
+
+ gen_require(`
+ type zented_client_packet_t;
+ ')
+
+ dontaudit $1 zented_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zented_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zented_client_packets'($*)) dnl
+
+ gen_require(`
+ type zented_client_packet_t;
+ ')
+
+ allow $1 zented_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zented_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zented_client_packets'($*)) dnl
+
+ gen_require(`
+ type zented_client_packet_t;
+ ')
+
+ dontaudit $1 zented_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zented_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zented_client_packets'($*)) dnl
+
+ corenet_send_zented_client_packets($1)
+ corenet_receive_zented_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zented_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zented_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zented_client_packets($1)
+ corenet_dontaudit_receive_zented_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zented_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zented_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zented_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zented_client_packets'($*)) dnl
+
+ gen_require(`
+ type zented_client_packet_t;
+ ')
+
+ allow $1 zented_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zented_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zented_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zented_server_packets'($*)) dnl
+
+ gen_require(`
+ type zented_server_packet_t;
+ ')
+
+ allow $1 zented_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zented_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zented_server_packets'($*)) dnl
+
+ gen_require(`
+ type zented_server_packet_t;
+ ')
+
+ dontaudit $1 zented_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zented_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zented_server_packets'($*)) dnl
+
+ gen_require(`
+ type zented_server_packet_t;
+ ')
+
+ allow $1 zented_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zented_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zented_server_packets'($*)) dnl
+
+ gen_require(`
+ type zented_server_packet_t;
+ ')
+
+ dontaudit $1 zented_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zented_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zented_server_packets'($*)) dnl
+
+ corenet_send_zented_server_packets($1)
+ corenet_receive_zented_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zented_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zented_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zented_server_packets($1)
+ corenet_dontaudit_receive_zented_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zented_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zented_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zented_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zented_server_packets'($*)) dnl
+
+ gen_require(`
+ type zented_server_packet_t;
+ ')
+
+ allow $1 zented_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zented_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+########################################
+##
+## Send and receive TCP traffic on the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP traffic on the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send UDP traffic on the zope port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_send_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_send_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_send_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP traffic on the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP traffic on the zope port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_receive_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_receive_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_receive_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP traffic on the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive
+## UDP traffic on the zope port.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_udp_sendrecv_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_udp_sendrecv_zope_port'($*)) dnl
+
+ refpolicywarn(`$0() has been deprecated, please remove.')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_udp_sendrecv_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind TCP sockets to the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_bind_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_bind_zope_port'($*)) dnl
+
+ gen_require(`
+ type zope_port_t;
+ ')
+
+ allow $1 zope_port_t:tcp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_bind_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Bind UDP sockets to the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_bind_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_bind_zope_port'($*)) dnl
+
+ gen_require(`
+ type zope_port_t;
+ ')
+
+ allow $1 zope_port_t:udp_socket name_bind;
+
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_bind_zope_port'($*)) dnl
+ ')
+
+
+########################################
+##
+## Make a TCP connection to the zope port.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_tcp_connect_zope_port',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_connect_zope_port'($*)) dnl
+
+ gen_require(`
+ type zope_port_t;
+ ')
+
+ allow $1 zope_port_t:tcp_socket name_connect;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_connect_zope_port'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zope_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zope_client_packets'($*)) dnl
+
+ gen_require(`
+ type zope_client_packet_t;
+ ')
+
+ allow $1 zope_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zope_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zope_client_packets'($*)) dnl
+
+ gen_require(`
+ type zope_client_packet_t;
+ ')
+
+ dontaudit $1 zope_client_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zope_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zope_client_packets'($*)) dnl
+
+ gen_require(`
+ type zope_client_packet_t;
+ ')
+
+ allow $1 zope_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zope_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zope_client_packets'($*)) dnl
+
+ gen_require(`
+ type zope_client_packet_t;
+ ')
+
+ dontaudit $1 zope_client_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zope_client packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zope_client_packets'($*)) dnl
+
+ corenet_send_zope_client_packets($1)
+ corenet_receive_zope_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zope_client packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zope_client_packets'($*)) dnl
+
+ corenet_dontaudit_send_zope_client_packets($1)
+ corenet_dontaudit_receive_zope_client_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zope_client_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zope_client the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zope_client_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zope_client_packets'($*)) dnl
+
+ gen_require(`
+ type zope_client_packet_t;
+ ')
+
+ allow $1 zope_client_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zope_client_packets'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Send zope_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_send_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_send_zope_server_packets'($*)) dnl
+
+ gen_require(`
+ type zope_server_packet_t;
+ ')
+
+ allow $1 zope_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_send_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send zope_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_send_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_send_zope_server_packets'($*)) dnl
+
+ gen_require(`
+ type zope_server_packet_t;
+ ')
+
+ dontaudit $1 zope_server_packet_t:packet send;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_send_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive zope_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_receive_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_receive_zope_server_packets'($*)) dnl
+
+ gen_require(`
+ type zope_server_packet_t;
+ ')
+
+ allow $1 zope_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_receive_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive zope_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_dontaudit_receive_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_receive_zope_server_packets'($*)) dnl
+
+ gen_require(`
+ type zope_server_packet_t;
+ ')
+
+ dontaudit $1 zope_server_packet_t:packet recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_receive_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive zope_server packets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_sendrecv_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_sendrecv_zope_server_packets'($*)) dnl
+
+ corenet_send_zope_server_packets($1)
+ corenet_receive_zope_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_sendrecv_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive zope_server packets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`corenet_dontaudit_sendrecv_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_dontaudit_sendrecv_zope_server_packets'($*)) dnl
+
+ corenet_dontaudit_send_zope_server_packets($1)
+ corenet_dontaudit_receive_zope_server_packets($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_dontaudit_sendrecv_zope_server_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel packets to zope_server the packet type.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`corenet_relabelto_zope_server_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_relabelto_zope_server_packets'($*)) dnl
+
+ gen_require(`
+ type zope_server_packet_t;
+ ')
+
+ allow $1 zope_server_packet_t:packet relabelto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_relabelto_zope_server_packets'($*)) dnl
+ ')
+
+
+
+
+
+
+########################################
+##
+## Send and receive TCP network traffic on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_tcp_sendrecv_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_tcp_sendrecv_lo_if'($*)) dnl
+
+ gen_require(`
+ type lo_netif_t;
+ ')
+
+ allow $1 lo_netif_t:netif { egress ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_tcp_sendrecv_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send UDP network traffic on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_send_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_send_lo_if'($*)) dnl
+
+ gen_require(`
+ type lo_netif_t;
+ ')
+
+ allow $1 lo_netif_t:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_send_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP network traffic on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_receive_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_receive_lo_if'($*)) dnl
+
+ gen_require(`
+ type lo_netif_t;
+ ')
+
+ allow $1 lo_netif_t:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_receive_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive UDP network traffic on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_udp_sendrecv_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_udp_sendrecv_lo_if'($*)) dnl
+
+ corenet_udp_send_lo_if($1)
+ corenet_udp_receive_lo_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_udp_sendrecv_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send raw IP packets on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_raw_send_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_send_lo_if'($*)) dnl
+
+ gen_require(`
+ type lo_netif_t;
+ ')
+
+ allow $1 lo_netif_t:netif { egress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_send_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive raw IP packets on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_raw_receive_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_receive_lo_if'($*)) dnl
+
+ gen_require(`
+ type lo_netif_t;
+ ')
+
+ allow $1 lo_netif_t:netif { ingress };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_receive_lo_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive raw IP packets on the lo interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`corenet_raw_sendrecv_lo_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `corenet_raw_sendrecv_lo_if'($*)) dnl
+
+ corenet_raw_send_lo_if($1)
+ corenet_raw_receive_lo_if($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `corenet_raw_sendrecv_lo_if'($*)) dnl
+ ')
+
+
+
+
+##
+## Policy for kernel threads, proc filesystem,
+## and unlabeled processes and objects.
+##
+##
+## This module has initial SIDs.
+##
+
+########################################
+##
+## Allows the kernel to start userland processes
+## by dynamic transitions to the specified domain.
+##
+##
+##
+## The process type entered by the kernel.
+##
+##
+#
+ define(`kernel_dyntrans_to',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dyntrans_to'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ domain_dyntrans_type(kernel_t)
+ allow kernel_t self:process setcurrent;
+ allow kernel_t $1:process dyntransition;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dyntrans_to'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows to start userland processes
+## by transitioning to the specified domain.
+##
+##
+##
+## The process type entered by kernel.
+##
+##
+##
+##
+## The executable type for the entrypoint.
+##
+##
+#
+ define(`kernel_domtrans_to',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_domtrans_to'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ domtrans_pattern(kernel_t, $2, $1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_domtrans_to'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows to start userland processes
+## by transitioning to the specified domain,
+## with a range transition.
+##
+##
+##
+## The process type entered by kernel.
+##
+##
+##
+##
+## The executable type for the entrypoint.
+##
+##
+##
+##
+## Range for the domain.
+##
+##
+#
+ define(`kernel_ranged_domtrans_to',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_ranged_domtrans_to'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ kernel_domtrans_to($1, $2)
+
+ ifdef(`enable_mcs',`
+ range_transition kernel_t $2:process $3;
+ ')
+
+ ifdef(`enable_mls',`
+ range_transition kernel_t $2:process $3;
+ mls_rangetrans_target($1)
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_ranged_domtrans_to'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows the kernel to mount filesystems on
+## the specified directory type.
+##
+##
+##
+## The type of the directory to use as a mountpoint.
+##
+##
+#
+ define(`kernel_rootfs_mountpoint',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rootfs_mountpoint'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow kernel_t $1:dir mounton;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rootfs_mountpoint'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set the process group of kernel threads.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_setpgid',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_setpgid'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:process setpgid;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_setpgid'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set the priority of kernel threads.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_setsched',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_setsched'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:process setsched;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_setsched'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a SIGCHLD signal to kernel threads.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_sigchld',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_sigchld'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_sigchld'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a kill signal to kernel threads.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_kill',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_kill'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_kill'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a generic signal to kernel threads.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_signal',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_signal'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_signal'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows the kernel to share state information with
+## the caller.
+##
+##
+##
+## The type of the process with which to share state information.
+##
+##
+#
+ define(`kernel_share_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_share_state'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow kernel_t $1:process share;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_share_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Permits caller to use kernel file descriptors.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_use_fds'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to use
+## kernel file descriptors.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_use_fds',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_use_fds'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:fd use;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_use_fds'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write kernel unnamed pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_pipes'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:fifo_file { read write };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read/write to kernel using a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_stream_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_stream_sockets'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:unix_stream_socket rw_socket_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_stream_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Connect to kernel using a unix
+## domain stream socket.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_stream_connect',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_stream_connect'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:unix_stream_socket connectto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_stream_connect'($*)) dnl
+ ')
+
+
+########################################
+##
+## Getattr on kernel unix datagram sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_dgram_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_dgram_sockets'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:unix_dgram_socket getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_dgram_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write kernel unix datagram sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_unix_dgram_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_unix_dgram_sockets'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:unix_dgram_socket { read write ioctl };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_unix_dgram_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send messages to kernel unix datagram sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_dgram_send',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dgram_send'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:unix_dgram_socket sendto;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dgram_send'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to load kernel modules
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_load_module',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_load_module'($*)) dnl
+
+ gen_require(`
+ attribute can_load_kernmodule;
+ ')
+
+ typeattribute $1 can_load_kernmodule;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_load_module'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow search the kernel key ring.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_search_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:key search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## dontaudit search the kernel key ring.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_search_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:key search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow link to the kernel key ring.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_link_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_link_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:key link;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_link_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## dontaudit link to the kernel key ring.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_link_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_link_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:key link;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_link_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow view the kernel key ring.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_view_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_view_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:key view;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_view_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## dontaudit view the kernel key ring.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_view_key',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_view_key'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:key view;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_view_key'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to read the ring buffer.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_ring_buffer',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_ring_buffer'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 self:capability2 syslog;
+ allow $1 kernel_t:system syslog_read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_ring_buffer'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read the ring buffer.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_read_ring_buffer',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_ring_buffer'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:system syslog_read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_ring_buffer'($*)) dnl
+ ')
+
+
+########################################
+##
+## Change the level of kernel messages logged to the console.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_change_ring_buffer_level',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_change_ring_buffer_level'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 self:capability2 syslog;
+ allow $1 kernel_t:system syslog_console;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_change_ring_buffer_level'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows the caller to clear the ring buffer.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_clear_ring_buffer',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_clear_ring_buffer'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 self:capability2 syslog;
+ allow $1 kernel_t:system syslog_mod;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_clear_ring_buffer'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to request the kernel to load a module
+##
+##
+##
+## Allow the specified domain to request that the kernel
+## load a kernel module. An example of this is the
+## auto-loading of network drivers when doing an
+## ioctl() on a network interface.
+##
+##
+## In the specific case of a module loading request
+## on a network interface, the domain will also
+## need the net_admin capability.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_request_load_module',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_request_load_module'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:system module_request;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_request_load_module'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit requests to the kernel to load a module.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_request_load_module',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_request_load_module'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ dontaudit $1 kernel_t:system module_request;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_request_load_module'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get information on all System V IPC objects.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_get_sysvipc_info',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_get_sysvipc_info'($*)) dnl
+
+ gen_require(`
+ type kernel_t;
+ ')
+
+ allow $1 kernel_t:system ipc_info;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_get_sysvipc_info'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get the attributes of a kernel debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ allow $1 debugfs_t:filesystem getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount a kernel debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mount_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mount_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ allow $1 debugfs_t:filesystem mount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mount_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unmount a kernel debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_unmount_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_unmount_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ allow $1 debugfs_t:filesystem unmount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_unmount_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Remount a kernel debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_remount_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_remount_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ allow $1 debugfs_t:filesystem remount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_remount_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search the contents of a kernel debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_search_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ search_dirs_pattern($1, debugfs_t, debugfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search the kernel debugging filesystem.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_search_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ dontaudit $1 debugfs_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read information from the debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ read_files_pattern($1, debugfs_t, debugfs_t)
+ read_lnk_files_pattern($1, debugfs_t, debugfs_t)
+ list_dirs_pattern($1, debugfs_t, debugfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to write kernel debugging filesystem dirs.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_write_debugfs_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_debugfs_dirs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ dontaudit $1 debugfs_t:dir write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_debugfs_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage information from the debugging filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_debugfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_debugfs'($*)) dnl
+
+ gen_require(`
+ type debugfs_t;
+ ')
+
+ manage_files_pattern($1, debugfs_t, debugfs_t)
+ read_lnk_files_pattern($1, debugfs_t, debugfs_t)
+ list_dirs_pattern($1, debugfs_t, debugfs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_debugfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount a kernel VM filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mount_kvmfs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mount_kvmfs'($*)) dnl
+
+ gen_require(`
+ type kvmfs_t;
+ ')
+
+ allow $1 kvmfs_t:filesystem mount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mount_kvmfs'($*)) dnl
+ ')
+
+
+########################################
+##
+## mount the proc filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mount_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mount_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:filesystem mount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mount_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## remount the proc filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_remount_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_remount_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:filesystem remount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_remount_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unmount the proc filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_unmount_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_unmount_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:filesystem unmount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_unmount_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get the attributes of the proc filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:filesystem getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount on proc directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_mounton_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:dir mounton;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to set the
+## attributes of directories in /proc.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_setattr_proc_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_setattr_proc_dirs'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:dir setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_setattr_proc_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search directories in /proc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_search_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ search_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## List the contents of directories in /proc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_list_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_list_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_list_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to list the
+## contents of directories in /proc.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_list_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_proc'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:dir list_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to write the
+## directories in /proc.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_write_proc_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_proc_dirs'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:dir write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_proc_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount the directories in /proc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mounton_proc_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_proc_dirs'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ allow $1 proc_t:dir mounton;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_proc_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get the attributes of files in /proc.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_proc_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_proc_files'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ getattr_files_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_proc_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read generic symbolic links in /proc.
+##
+##
+##
+## Allow the specified domain to read (follow) generic
+## symbolic links (symlinks) in the proc filesystem (/proc).
+## This interface does not include access to the targets of
+## these links. An example symlink is /proc/self.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_proc_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_proc_symlinks'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ read_lnk_files_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_proc_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to read system state information in /proc.
+##
+##
+##
+## Allow the specified domain to read general system
+## state information from the proc filesystem (/proc).
+##
+##
+## Generally it should be safe to allow this access. Some
+## example files that can be read based on this interface:
+##
+##
+## - /proc/cpuinfo
+## - /proc/meminfo
+## - /proc/uptime
+##
+##
+## This does not allow access to sysctl entries (/proc/sys/*)
+## nor process state information (/proc/pid).
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+#
+ define(`kernel_read_system_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_system_state'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ read_files_pattern($1, proc_t, proc_t)
+ read_lnk_files_pattern($1, proc_t, proc_t)
+
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_system_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Write to generic proc entries.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+# cjp: this should probably go away. any
+# file thats writable in proc should really
+# have its own label.
+#
+ define(`kernel_write_proc_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_write_proc_files'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ write_files_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_write_proc_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to
+## read system state information in proc.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_read_system_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_system_state'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_system_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to
+## read symbolic links in proc.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_read_proc_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_proc_symlinks'($*)) dnl
+
+ gen_require(`
+ type proc_t;
+ ')
+
+ dontaudit $1 proc_t:lnk_file read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_proc_symlinks'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow caller to read and write state information for AFS.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_afs_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_afs_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_afs_t;
+ ')
+
+ list_dirs_pattern($1, proc_t, proc_t)
+ rw_files_pattern($1, proc_afs_t, proc_afs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_afs_state'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow caller to read the state information for software raid.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_software_raid_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_software_raid_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_mdstat_t;
+ ')
+
+ read_files_pattern($1, proc_t, proc_mdstat_t)
+
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_software_raid_state'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Allow caller to read and set the state information for software raid.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_software_raid_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_software_raid_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_mdstat_t;
+ ')
+
+ rw_files_pattern($1, proc_t, proc_mdstat_t)
+
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_software_raid_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to get attribues of core kernel interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_core_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_core_if'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_kcore_t;
+ ')
+
+ getattr_files_pattern($1, proc_t, proc_kcore_t)
+
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_core_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to get the attributes of
+## core kernel interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_core_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_core_if'($*)) dnl
+
+ gen_require(`
+ type proc_kcore_t;
+ ')
+
+ dontaudit $1 proc_kcore_t:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_core_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allows caller to read the core kernel interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_core_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_core_if'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_kcore_t;
+ attribute can_dump_kernel;
+ ')
+
+ allow $1 self:capability sys_rawio;
+ read_files_pattern($1, proc_t, proc_kcore_t)
+ list_dirs_pattern($1, proc_t, proc_t)
+
+ typeattribute $1 can_dump_kernel;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_core_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read kernel messages
+## using the /proc/kmsg interface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_messages',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_messages'($*)) dnl
+
+ gen_require(`
+ attribute can_receive_kernel_messages;
+ type proc_kmsg_t, proc_t;
+ ')
+
+ read_files_pattern($1, proc_t, proc_kmsg_t)
+
+ typeattribute $1 can_receive_kernel_messages;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_messages'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to get the attributes of kernel message
+## interface (/proc/kmsg).
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_message_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_message_if'($*)) dnl
+
+ gen_require(`
+ type proc_kmsg_t, proc_t;
+ ')
+
+ getattr_files_pattern($1, proc_t, proc_kmsg_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_message_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get the attributes of kernel
+## message interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_message_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_message_if'($*)) dnl
+
+ gen_require(`
+ type proc_kmsg_t;
+ ')
+
+ dontaudit $1 proc_kmsg_t:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_message_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount on kernel message interfaces files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_mounton_message_if',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_message_if'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_kmsg_t;
+ ')
+
+ allow $1 proc_t:dir list_dir_perms;
+ allow $1 proc_kmsg_t:file { getattr mounton };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_message_if'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search the network
+## state directory.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`kernel_dontaudit_search_network_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_network_state'($*)) dnl
+
+ gen_require(`
+ type proc_net_t;
+ ')
+
+ dontaudit $1 proc_net_t:dir search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_network_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow searching of network state directory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_search_network_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_network_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_net_t;
+ ')
+
+ search_dirs_pattern($1, proc_t, proc_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_network_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the network state information.
+##
+##
+##
+## Allow the specified domain to read the networking
+## state information. This includes several pieces
+## of networking information, such as network interface
+## names, netfilter (iptables) statistics, protocol
+## information, routes, and remote procedure call (RPC)
+## information.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+#
+ define(`kernel_read_network_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_network_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_net_t;
+ ')
+
+ read_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
+ read_lnk_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
+
+ list_dirs_pattern($1, proc_t, proc_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_network_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read the network state symbolic links.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_network_state_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_network_state_symlinks'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_net_t;
+ ')
+
+ read_lnk_files_pattern($1, { proc_t proc_net_t }, proc_net_t)
+
+ list_dirs_pattern($1, proc_t, proc_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_network_state_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow searching of xen state directory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_search_xen_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_xen_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_xen_t;
+ ')
+
+ search_dirs_pattern($1, proc_t, proc_xen_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_xen_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search the xen
+## state directory.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`kernel_dontaudit_search_xen_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_xen_state'($*)) dnl
+
+ gen_require(`
+ type proc_xen_t;
+ ')
+
+ dontaudit $1 proc_xen_t:dir search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_xen_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read the xen state information.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_xen_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_xen_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_xen_t;
+ ')
+
+ read_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
+ read_lnk_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
+
+ list_dirs_pattern($1, proc_t, proc_xen_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_xen_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read the xen state symbolic links.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_xen_state_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_xen_state_symlinks'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_xen_t;
+ ')
+
+ read_lnk_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
+
+ list_dirs_pattern($1, proc_t, proc_xen_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_xen_state_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to write xen state information.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_write_xen_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_write_xen_state'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_xen_t;
+ ')
+
+ write_files_pattern($1, { proc_t proc_xen_t }, proc_xen_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_write_xen_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow attempts to list all proc directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_list_all_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_list_all_proc'($*)) dnl
+
+ gen_require(`
+ attribute proc_type;
+ ')
+
+ allow $1 proc_type:dir list_dir_perms;
+ allow $1 proc_type:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_list_all_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to list all proc directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_list_all_proc',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_all_proc'($*)) dnl
+
+ gen_require(`
+ attribute proc_type;
+ ')
+
+ dontaudit $1 proc_type:dir list_dir_perms;
+ dontaudit $1 proc_type:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_all_proc'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to search
+## the base directory of sysctls.
+##
+##
+##
+## Domain to not audit.
+##
+##
+##
+#
+ define(`kernel_dontaudit_search_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_t;
+ ')
+
+ dontaudit $1 sysctl_t:dir search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount on sysctl_t dirs.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_mounton_sysctl_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_sysctl_dirs'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t;
+ ')
+
+ allow $1 proc_t:dir list_dir_perms;
+ allow $1 sysctl_t:dir { getattr mounton };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_sysctl_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow access to read sysctl directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_t, proc_t;
+ ')
+
+ list_dirs_pattern($1, proc_t, sysctl_t)
+ read_files_pattern($1, sysctl_t, sysctl_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount on sysctl files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_mounton_sysctl_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_sysctl_files'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t;
+ ')
+
+ allow $1 { proc_t sysctl_t }:dir list_dir_perms;
+ allow $1 sysctl_t:file { getattr mounton };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_sysctl_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read the device sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_device_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_device_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_dev_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_dev_t }, sysctl_dev_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_dev_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_device_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write device sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_device_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_device_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_dev_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_dev_t }, sysctl_dev_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_dev_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_device_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to search virtual memory sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_search_vm_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_vm_sysctl'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_vm_t;
+ ')
+
+ search_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_vm_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read virtual memory sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_vm_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_vm_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_vm_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_vm_t }, sysctl_vm_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_vm_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write virtual memory sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_vm_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_vm_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_vm_t;
+ ')
+
+ rw_files_pattern($1 ,{ proc_t sysctl_t sysctl_vm_t }, sysctl_vm_t)
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_vm_t)
+
+ # hal needs this
+ allow $1 sysctl_vm_t:dir write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_vm_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search network sysctl directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_search_network_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_network_sysctl'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_net_t;
+ ')
+
+ search_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_network_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to search network sysctl directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_search_network_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_network_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_net_t;
+ ')
+
+ dontaudit $1 sysctl_net_t:dir search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_network_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read network sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_net_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_net_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_net_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_net_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to modiry contents of sysctl network files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_net_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_net_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_net_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_net_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_net_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read unix domain
+## socket sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_unix_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_unix_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_net_t, sysctl_net_unix_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_unix_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, { sysctl_net_t sysctl_net_unix_t })
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_unix_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write unix domain
+## socket sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_unix_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_unix_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_net_t, sysctl_net_unix_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_net_t }, sysctl_net_unix_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, { sysctl_net_t sysctl_net_unix_t })
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_unix_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the hotplug sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_hotplug_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_hotplug_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t, sysctl_hotplug_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_hotplug_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_hotplug_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the hotplug sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_hotplug_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_hotplug_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t, sysctl_hotplug_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_hotplug_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_hotplug_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the modprobe sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_modprobe_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_modprobe_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t, sysctl_modprobe_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_modprobe_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_modprobe_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write the modprobe sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_modprobe_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_modprobe_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t, sysctl_modprobe_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_modprobe_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_modprobe_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search generic kernel sysctls.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_search_kernel_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_kernel_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_kernel_t;
+ ')
+
+ dontaudit $1 sysctl_kernel_t:dir search;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_kernel_sysctl'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Do not audit attempted reading of kernel sysctls
+##
+##
+##
+## Domain to not audit accesses from
+##
+##
+#
+ define(`kernel_dontaudit_read_kernel_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_kernel_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_kernel_t;
+ ')
+
+ dontaudit $1 sysctl_kernel_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_kernel_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read generic crypto sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_crypto_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_crypto_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_crypto_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_crypto_t }, sysctl_crypto_t)
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_crypto_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_crypto_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read general kernel sysctls.
+##
+##
+##
+## Allow the specified domain to read general
+## kernel sysctl settings. These settings are typically
+## read using the sysctl program. The settings
+## that are included by this interface are prefixed
+## with "kernel.", for example, kernel.sysrq.
+##
+##
+## This does not include access to the hotplug
+## handler setting (kernel.hotplug)
+## nor the module installer handler setting
+## (kernel.modprobe).
+##
+##
+## Related interfaces:
+##
+##
+## - kernel_rw_kernel_sysctl()
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_kernel_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_kernel_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_kernel_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_kernel_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to write generic kernel sysctls.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_write_kernel_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_kernel_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_kernel_t;
+ ')
+
+ dontaudit $1 sysctl_kernel_t:file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_kernel_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write generic kernel sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_kernel_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_kernel_sysctl'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_t }, sysctl_kernel_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_kernel_sysctl'($*)) dnl
+ ')
+
+
+#######################################
+##
+## Mount on kernel sysctl files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_mounton_kernel_sysctl_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_kernel_sysctl_files'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_t;
+ ')
+
+ allow $1 { proc_t sysctl_t sysctl_kernel_t }:dir list_dir_perms;
+ allow $1 sysctl_kernel_t:file { getattr mounton };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_kernel_sysctl_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read kernel ns lastpid sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_kernel_ns_lastpid_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_kernel_ns_lastpid_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_ns_last_pid_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_kernel_ns_last_pid_t }, sysctl_kernel_ns_last_pid_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_ns_last_pid_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_kernel_ns_lastpid_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to write kernel ns lastpid sysctls.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_write_kernel_ns_lastpid_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_kernel_ns_lastpid_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_kernel_ns_last_pid_t;
+ ')
+
+ dontaudit $1 sysctl_kernel_ns_last_pid_t:file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_kernel_ns_lastpid_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write kernel ns lastpid sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_kernel_ns_lastpid_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_kernel_ns_lastpid_sysctl'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_kernel_ns_last_pid_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_kernel_ns_last_pid_t }, sysctl_kernel_ns_last_pid_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_kernel_ns_last_pid_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_kernel_ns_lastpid_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Search filesystem sysctl directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_search_fs_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_search_fs_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_fs_t;
+ ')
+
+ search_dirs_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_search_fs_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read filesystem sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_fs_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_fs_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_fs_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_fs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_fs_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write fileystem sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_fs_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_fs_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_t, sysctl_fs_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_t sysctl_fs_t }, sysctl_fs_t)
+
+ list_dirs_pattern($1, { proc_t sysctl_t }, sysctl_fs_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_fs_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read IRQ sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_irq_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_irq_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_irq_t;
+ ')
+
+ read_files_pattern($1, { proc_t sysctl_irq_t }, sysctl_irq_t)
+
+ list_dirs_pattern($1, proc_t, sysctl_irq_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_irq_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write IRQ sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_irq_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_irq_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, sysctl_irq_t;
+ ')
+
+ rw_files_pattern($1, { proc_t sysctl_irq_t }, sysctl_irq_t)
+
+ list_dirs_pattern($1, proc_t, sysctl_irq_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_irq_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read RPC sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_rpc_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_rpc_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_net_t, sysctl_rpc_t;
+ ')
+
+ read_files_pattern($1, { proc_t proc_net_t sysctl_rpc_t }, sysctl_rpc_t)
+
+ list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_rpc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_rpc_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write RPC sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_rpc_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_rpc_sysctls'($*)) dnl
+
+ gen_require(`
+ type proc_t, proc_net_t, sysctl_rpc_t;
+ ')
+
+ rw_files_pattern($1, { proc_t proc_net_t sysctl_rpc_t }, sysctl_rpc_t)
+
+ list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_rpc_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_rpc_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to list all sysctl directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_list_all_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_all_sysctls'($*)) dnl
+
+ gen_require(`
+ attribute sysctl_type;
+ ')
+
+ dontaudit $1 sysctl_type:dir list_dir_perms;
+ dontaudit $1 sysctl_type:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_all_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to read all sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_all_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_all_sysctls'($*)) dnl
+
+ gen_require(`
+ attribute sysctl_type;
+ type proc_t, proc_net_t;
+ ')
+
+ # proc_net_t for /proc/net/rpc sysctls
+ read_files_pattern($1, { proc_t proc_net_t sysctl_type }, sysctl_type)
+
+ list_dirs_pattern($1, { proc_t proc_net_t }, sysctl_type)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_all_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write all sysctls.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_all_sysctls',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_all_sysctls'($*)) dnl
+
+ gen_require(`
+ attribute sysctl_type;
+ type proc_t, proc_net_t;
+ ')
+
+ # proc_net_t for /proc/net/rpc sysctls
+ rw_files_pattern($1, { proc_t proc_net_t sysctl_type }, sysctl_type)
+
+ allow $1 sysctl_type:dir list_dir_perms;
+ # why is setattr needed?
+ allow $1 sysctl_type:file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_all_sysctls'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a kill signal to unlabeled processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_kill_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_kill_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:process sigkill;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_kill_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount a kernel unlabeled filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mount_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mount_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:filesystem mount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mount_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unmount a kernel unlabeled filesystem.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_unmount_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_unmount_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:filesystem unmount;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_unmount_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send general signals to unlabeled processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_signal_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_signal_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:process signal;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_signal_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a null signal to unlabeled processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_signull_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_signull_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:process signull;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_signull_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a stop signal to unlabeled processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_sigstop_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_sigstop_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:process sigstop;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_sigstop_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send a child terminated signal to unlabeled processes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_sigchld_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_sigchld_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:process sigchld;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_sigchld_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Get the attributes of unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_getattr_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_getattr_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir getattr_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_getattr_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to search unlabeled directories.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_search_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_search_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:dir search_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_search_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## List unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_list_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_list_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir list_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_list_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read the process state (/proc/pid) of all unlabeled_t.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_unlabeled_state',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_unlabeled_state'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir list_dir_perms;
+ read_files_pattern($1, unlabeled_t, unlabeled_t)
+ read_lnk_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_unlabeled_state'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to list unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_dontaudit_list_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_list_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:dir list_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_list_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir rw_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir delete_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir manage_dir_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Mount a filesystem on an unlabeled directory.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_mounton_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_mounton_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir { search_dir_perms mounton };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_mounton_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read unlabeled files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_read_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write unlabeled files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:file delete_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete unlabeled files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:file manage_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get the
+## attributes of an unlabeled file.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to
+## read an unlabeled file.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_read_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_read_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:file { getattr read };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_read_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled symbolic links.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_symlinks'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ delete_lnk_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete unlabeled symbolic links.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_unlabeled_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_symlinks'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:lnk_file manage_lnk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get the
+## attributes of unlabeled symbolic links.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_symlinks'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:lnk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get the
+## attributes of unlabeled named pipes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_pipes'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:fifo_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get the
+## attributes of unlabeled named sockets.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_sockets'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:sock_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get attributes for
+## unlabeled block devices.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_blk_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_blk_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:blk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_blk_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write unlabeled block device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_rw_unlabeled_blk_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_unlabeled_blk_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:blk_file rw_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_unlabeled_blk_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled block device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_blk_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_blk_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ delete_blk_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_blk_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete unlabeled block device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_unlabeled_blk_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_blk_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:blk_file manage_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_blk_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts by caller to get attributes for
+## unlabeled character devices.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_getattr_unlabeled_chr_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_getattr_unlabeled_chr_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:chr_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_getattr_unlabeled_chr_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to
+## write unlabeled character devices.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_write_unlabeled_chr_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_write_unlabeled_chr_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:file write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_write_unlabeled_chr_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled character device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_chr_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_chr_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ delete_chr_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_chr_files'($*)) dnl
+ ')
+
+
+
+########################################
+##
+## Create, read, write, and delete unlabeled character device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_manage_unlabeled_chr_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_manage_unlabeled_chr_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:chr_file manage_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_manage_unlabeled_chr_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to relabel unlabeled directories.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_dirs',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_dirs'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:dir { list_dir_perms relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_dirs'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to relabel unlabeled files.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_files',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_files'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ kernel_list_unlabeled($1)
+ allow $1 unlabeled_t:file { getattr relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_files'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to relabel unlabeled symbolic links.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_symlinks',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_symlinks'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ kernel_list_unlabeled($1)
+ allow $1 unlabeled_t:lnk_file { getattr relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_symlinks'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to relabel unlabeled named pipes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_pipes'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ kernel_list_unlabeled($1)
+ allow $1 unlabeled_t:fifo_file { getattr relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled named pipes
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_pipes',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_pipes'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ delete_fifo_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_pipes'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow caller to relabel unlabeled named sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_sockets'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ kernel_list_unlabeled($1)
+ allow $1 unlabeled_t:sock_file { getattr relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_sockets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Delete unlabeled named sockets.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_delete_unlabeled_sockets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_delete_unlabeled_sockets'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ delete_sock_files_pattern($1, unlabeled_t, unlabeled_t)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_delete_unlabeled_sockets'($*)) dnl
+ ')
+
+########################################
+##
+## Send and receive messages from an
+## unlabeled IPSEC association.
+##
+##
+##
+## Send and receive messages from an
+## unlabeled IPSEC association. Network
+## connections that are not protected
+## by IPSEC have use an unlabeled
+## assocation.
+##
+##
+## The corenetwork interface
+## corenet_non_ipsec_sendrecv() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_sendrecv_unlabeled_association',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_sendrecv_unlabeled_association'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:association { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_sendrecv_unlabeled_association'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to send and receive messages
+## from an unlabeled IPSEC association.
+##
+##
+##
+## Do not audit attempts to send and receive messages
+## from an unlabeled IPSEC association. Network
+## connections that are not protected
+## by IPSEC have use an unlabeled
+## assocation.
+##
+##
+## The corenetwork interface
+## corenet_dontaudit_non_ipsec_sendrecv() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_sendrecv_unlabeled_association',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_sendrecv_unlabeled_association'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:association { sendto recvfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_sendrecv_unlabeled_association'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive TCP packets from an unlabeled connection.
+##
+##
+##
+## Receive TCP packets from an unlabeled connection.
+##
+##
+## The corenetwork interface corenet_tcp_recv_unlabeled() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_tcp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_tcp_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:tcp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_tcp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive TCP packets from an unlabeled
+## connection.
+##
+##
+##
+## Do not audit attempts to receive TCP packets from an unlabeled
+## connection.
+##
+##
+## The corenetwork interface corenet_dontaudit_tcp_recv_unlabeled()
+## should be used instead of this one.
+##
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_tcp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:tcp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_tcp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive UDP packets from an unlabeled connection.
+##
+##
+##
+## Receive UDP packets from an unlabeled connection.
+##
+##
+## The corenetwork interface corenet_udp_recv_unlabeled() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_udp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_udp_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:udp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_udp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive UDP packets from an unlabeled
+## connection.
+##
+##
+##
+## Do not audit attempts to receive UDP packets from an unlabeled
+## connection.
+##
+##
+## The corenetwork interface corenet_dontaudit_udp_recv_unlabeled()
+## should be used instead of this one.
+##
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_udp_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:udp_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_udp_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive Raw IP packets from an unlabeled connection.
+##
+##
+##
+## Receive Raw IP packets from an unlabeled connection.
+##
+##
+## The corenetwork interface corenet_raw_recv_unlabeled() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_raw_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_raw_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:rawip_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_raw_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive Raw IP packets from an unlabeled
+## connection.
+##
+##
+##
+## Do not audit attempts to receive Raw IP packets from an unlabeled
+## connection.
+##
+##
+## The corenetwork interface corenet_dontaudit_raw_recv_unlabeled()
+## should be used instead of this one.
+##
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_raw_recvfrom_unlabeled',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:rawip_socket recvfrom;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_raw_recvfrom_unlabeled'($*)) dnl
+ ')
+
+
+########################################
+##
+## Send and receive unlabeled packets.
+##
+##
+##
+## Send and receive unlabeled packets.
+## These packets do not match any netfilter
+## SECMARK rules.
+##
+##
+## The corenetwork interface
+## corenet_sendrecv_unlabeled_packets() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_sendrecv_unlabeled_packets',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_sendrecv_unlabeled_packets'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:packet { send recv };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_sendrecv_unlabeled_packets'($*)) dnl
+ ')
+
+
+########################################
+##
+## Receive packets from an unlabeled peer.
+##
+##
+##
+## Receive packets from an unlabeled peer, these packets do not have any
+## peer labeling information present.
+##
+##
+## The corenetwork interface corenet_recvfrom_unlabeled_peer() should
+## be used instead of this one.
+##
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_recvfrom_unlabeled_peer',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_recvfrom_unlabeled_peer'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:peer recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_recvfrom_unlabeled_peer'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to receive packets from an unlabeled peer.
+##
+##
+##
+## Do not audit attempts to receive packets from an unlabeled peer,
+## these packets do not have any peer labeling information present.
+##
+##
+## The corenetwork interface corenet_dontaudit_*_recvfrom_unlabeled()
+## should be used instead of this one.
+##
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`kernel_dontaudit_recvfrom_unlabeled_peer',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_dontaudit_recvfrom_unlabeled_peer'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ dontaudit $1 unlabeled_t:peer recv;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_dontaudit_recvfrom_unlabeled_peer'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel from unlabeled database objects.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_relabelfrom_unlabeled_database',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_relabelfrom_unlabeled_database'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ class db_database { setattr relabelfrom };
+ class db_schema { setattr relabelfrom };
+ class db_table { setattr relabelfrom };
+ class db_sequence { setattr relabelfrom };
+ class db_view { setattr relabelfrom };
+ class db_procedure { setattr relabelfrom };
+ class db_language { setattr relabelfrom };
+ class db_column { setattr relabelfrom };
+ class db_tuple { update relabelfrom };
+ class db_blob { setattr relabelfrom };
+ ')
+
+ allow $1 unlabeled_t:db_database { setattr relabelfrom };
+ allow $1 unlabeled_t:db_schema { setattr relabelfrom };
+ allow $1 unlabeled_t:db_table { setattr relabelfrom };
+ allow $1 unlabeled_t:db_sequence { setattr relabelfrom };
+ allow $1 unlabeled_t:db_view { setattr relabelfrom };
+ allow $1 unlabeled_t:db_procedure { setattr relabelfrom };
+ allow $1 unlabeled_t:db_language { setattr relabelfrom };
+ allow $1 unlabeled_t:db_column { setattr relabelfrom };
+ allow $1 unlabeled_t:db_tuple { update relabelfrom };
+ allow $1 unlabeled_t:db_blob { setattr relabelfrom };
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_relabelfrom_unlabeled_database'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unconfined access to kernel module resources.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_unconfined'($*)) dnl
+
+ gen_require(`
+ attribute kern_unconfined;
+ ')
+
+ typeattribute $1 kern_unconfined;
+ kernel_load_module($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_unconfined'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read virtual memory overcommit sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_read_vm_overcommit_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_read_vm_overcommit_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_vm_overcommit_t;
+ ')
+
+ kernel_search_vm_sysctl($1)
+ allow $1 sysctl_vm_overcommit_t:file read_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_read_vm_overcommit_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Read and write virtual memory overcommit sysctl.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+#
+ define(`kernel_rw_vm_overcommit_sysctl',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_rw_vm_overcommit_sysctl'($*)) dnl
+
+ gen_require(`
+ type sysctl_vm_overcommit_t;
+ ')
+
+ kernel_search_vm_sysctl($1)
+ allow $1 sysctl_vm_overcommit_t:file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_rw_vm_overcommit_sysctl'($*)) dnl
+ ')
+
+
+########################################
+##
+## Access unlabeled infiniband pkeys.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_ib_access_unlabeled_pkeys',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_ib_access_unlabeled_pkeys'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:infiniband_pkey access;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_ib_access_unlabeled_pkeys'($*)) dnl
+ ')
+
+
+########################################
+##
+## Manage subnet on unlabeled Infiniband endports.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`kernel_ib_manage_subnet_unlabeled_endports',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `kernel_ib_manage_subnet_unlabeled_endports'($*)) dnl
+
+ gen_require(`
+ type unlabeled_t;
+ ')
+
+ allow $1 unlabeled_t:infiniband_endport manage_subnet;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `kernel_ib_manage_subnet_unlabeled_endports'($*)) dnl
+ ')
+
+
+## Policy controlling access to storage devices
+
+########################################
+##
+## Allow the caller to get the attributes of fixed disk
+## device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_getattr_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_getattr_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_getattr_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to get
+## the attributes of fixed disk device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_getattr_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_getattr_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dontaudit $1 fixed_disk_device_t:blk_file getattr;
+ dontaudit $1 fixed_disk_device_t:chr_file getattr; # /dev/rawctl
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_getattr_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to set the attributes of fixed disk
+## device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_setattr_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_setattr_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_setattr_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to set
+## the attributes of fixed disk device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_setattr_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_setattr_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dontaudit $1 fixed_disk_device_t:blk_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_setattr_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read from a fixed disk.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_raw_read_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_read_fixed_disk'($*)) dnl
+
+ gen_require(`
+ attribute fixed_disk_raw_read;
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file read_blk_file_perms;
+ allow $1 fixed_disk_device_t:chr_file read_chr_file_perms;
+ typeattribute $1 fixed_disk_raw_read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_read_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read from a fixed disk
+## if a tunable is set.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Tunable to depend on
+##
+##
+#
+ define(`storage_raw_read_fixed_disk_cond',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_read_fixed_disk_cond'($*)) dnl
+
+ gen_require(`
+ attribute fixed_disk_raw_read;
+ type fixed_disk_device_t;
+ ')
+
+ typeattribute $1 fixed_disk_raw_read;
+ tunable_policy($2, `
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file read_blk_file_perms;
+ allow $1 fixed_disk_device_t:chr_file read_chr_file_perms;
+ ')
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_read_fixed_disk_cond'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to read
+## fixed disk device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_read_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_read_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+
+ ')
+
+ dontaudit $1 fixed_disk_device_t:blk_file read_blk_file_perms;
+ dontaudit $1 fixed_disk_device_t:chr_file read_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_read_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly write to a fixed disk.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_raw_write_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_write_fixed_disk'($*)) dnl
+
+ gen_require(`
+ attribute fixed_disk_raw_write;
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file write_blk_file_perms;
+ allow $1 fixed_disk_device_t:chr_file write_chr_file_perms;
+ typeattribute $1 fixed_disk_raw_write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_write_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to write
+## fixed disk device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_write_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_write_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+
+ ')
+
+ dontaudit $1 fixed_disk_device_t:blk_file write_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_write_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read and write to a fixed disk.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_raw_rw_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_rw_fixed_disk'($*)) dnl
+
+ storage_raw_read_fixed_disk($1)
+ storage_raw_write_fixed_disk($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_rw_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to create fixed disk device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_create_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_create_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ allow $1 self:capability mknod;
+ allow $1 fixed_disk_device_t:blk_file create_blk_file_perms;
+ dev_add_entry_generic_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_create_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to delete fixed disk device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_delete_fixed_disk_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_delete_fixed_disk_dev'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ allow $1 fixed_disk_device_t:blk_file delete_blk_file_perms;
+ dev_remove_entry_generic_dirs($1)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_delete_fixed_disk_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create, read, write, and delete fixed disk device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_manage_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_manage_fixed_disk'($*)) dnl
+
+ gen_require(`
+ attribute fixed_disk_raw_read, fixed_disk_raw_write;
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 self:capability mknod;
+ allow $1 fixed_disk_device_t:blk_file manage_blk_file_perms;
+ allow $1 fixed_disk_device_t:chr_file manage_chr_file_perms;
+ typeattribute $1 fixed_disk_raw_read, fixed_disk_raw_write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_manage_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create block devices in /dev with the fixed disk type
+## via an automatic type transition.
+##
+##
+##
+## Domain allowed access.
+##
+##
+##
+##
+## Optional filename of the block device to be created
+##
+##
+#
+ define(`storage_dev_filetrans_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dev_filetrans_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dev_filetrans($1, fixed_disk_device_t, blk_file, $2)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dev_filetrans_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Create block devices in on a tmpfs filesystem with the
+## fixed disk type via an automatic type transition.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_tmpfs_filetrans_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_tmpfs_filetrans_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ fs_tmpfs_filetrans($1, fixed_disk_device_t, blk_file)
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_tmpfs_filetrans_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Relabel fixed disk device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_relabel_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_relabel_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file relabel_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_relabel_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Enable a fixed disk device as swap space
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_swapon_fixed_disk',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_swapon_fixed_disk'($*)) dnl
+
+ gen_require(`
+ type fixed_disk_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fixed_disk_device_t:blk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_swapon_fixed_disk'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to get the attributes
+## of device nodes of fuse devices.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_getattr_fuse_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_getattr_fuse_dev'($*)) dnl
+
+ gen_require(`
+ type fuse_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 fuse_device_t:chr_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_getattr_fuse_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## read or write fuse device interfaces.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_rw_fuse',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_rw_fuse'($*)) dnl
+
+ gen_require(`
+ type fuse_device_t;
+ ')
+
+ allow $1 fuse_device_t:chr_file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_rw_fuse'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read or write
+## fuse device interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_rw_fuse',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_rw_fuse'($*)) dnl
+
+ gen_require(`
+ type fuse_device_t;
+ ')
+
+ dontaudit $1 fuse_device_t:chr_file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_rw_fuse'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to get the attributes of
+## the generic SCSI interface device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_getattr_scsi_generic_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_getattr_scsi_generic_dev'($*)) dnl
+
+ gen_require(`
+ type scsi_generic_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 scsi_generic_device_t:chr_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_getattr_scsi_generic_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to set the attributes of
+## the generic SCSI interface device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_setattr_scsi_generic_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_setattr_scsi_generic_dev'($*)) dnl
+
+ gen_require(`
+ type scsi_generic_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 scsi_generic_device_t:chr_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_setattr_scsi_generic_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read, in a
+## generic fashion, from any SCSI device.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_read_scsi_generic',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_read_scsi_generic'($*)) dnl
+
+ gen_require(`
+ attribute scsi_generic_read;
+ type scsi_generic_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 scsi_generic_device_t:chr_file read_chr_file_perms;
+ typeattribute $1 scsi_generic_read;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_read_scsi_generic'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly write, in a
+## generic fashion, from any SCSI device.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_write_scsi_generic',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_write_scsi_generic'($*)) dnl
+
+ gen_require(`
+ attribute scsi_generic_write;
+ type scsi_generic_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 scsi_generic_device_t:chr_file write_chr_file_perms;
+ typeattribute $1 scsi_generic_write;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_write_scsi_generic'($*)) dnl
+ ')
+
+
+########################################
+##
+## Set attributes of the device nodes
+## for the SCSI generic inerface.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_setattr_scsi_generic_dev_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_setattr_scsi_generic_dev_dev'($*)) dnl
+
+ gen_require(`
+ type scsi_generic_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 scsi_generic_device_t:chr_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_setattr_scsi_generic_dev_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to read or write
+## SCSI generic device interfaces.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_rw_scsi_generic',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_rw_scsi_generic'($*)) dnl
+
+ gen_require(`
+ type scsi_generic_device_t;
+ ')
+
+ dontaudit $1 scsi_generic_device_t:chr_file rw_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_rw_scsi_generic'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to get the attributes of removable
+## devices device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_getattr_removable_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_getattr_removable_dev'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 removable_device_t:blk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_getattr_removable_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to get
+## the attributes of removable devices device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_getattr_removable_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_getattr_removable_dev'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dontaudit $1 removable_device_t:blk_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_getattr_removable_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to read
+## removable devices device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_read_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_read_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+
+ ')
+
+ dontaudit $1 removable_device_t:blk_file read_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_read_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to write
+## removable devices device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_write_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_write_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dontaudit $1 removable_device_t:blk_file write_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_write_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to set the attributes of removable
+## devices device nodes.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_setattr_removable_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_setattr_removable_dev'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 removable_device_t:blk_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_setattr_removable_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts made by the caller to set
+## the attributes of removable devices device nodes.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_setattr_removable_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_setattr_removable_dev'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dontaudit $1 removable_device_t:blk_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_setattr_removable_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read from
+## a removable device.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_raw_read_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_read_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 removable_device_t:blk_file read_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_read_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to directly read removable devices.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_raw_read_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_raw_read_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dontaudit $1 removable_device_t:blk_file read_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_raw_read_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly write to
+## a removable device.
+## This is extremely dangerous as it can bypass the
+## SELinux protections for filesystem objects, and
+## should only be used by trusted domains.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_raw_write_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_raw_write_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 removable_device_t:blk_file write_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_raw_write_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Do not audit attempts to directly write removable devices.
+##
+##
+##
+## Domain to not audit.
+##
+##
+#
+ define(`storage_dontaudit_raw_write_removable_device',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_dontaudit_raw_write_removable_device'($*)) dnl
+
+ gen_require(`
+ type removable_device_t;
+ ')
+
+ dontaudit $1 removable_device_t:blk_file write_blk_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_dontaudit_raw_write_removable_device'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly read
+## a tape device.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_read_tape',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_read_tape'($*)) dnl
+
+ gen_require(`
+ type tape_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tape_device_t:chr_file read_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_read_tape'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to directly write
+## a tape device.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_write_tape',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_write_tape'($*)) dnl
+
+ gen_require(`
+ type tape_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tape_device_t:chr_file write_chr_file_perms;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_write_tape'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to get the attributes
+## of device nodes of tape devices.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_getattr_tape_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_getattr_tape_dev'($*)) dnl
+
+ gen_require(`
+ type tape_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tape_device_t:chr_file getattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_getattr_tape_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Allow the caller to set the attributes
+## of device nodes of tape devices.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_setattr_tape_dev',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_setattr_tape_dev'($*)) dnl
+
+ gen_require(`
+ type tape_device_t;
+ ')
+
+ dev_list_all_dev_nodes($1)
+ allow $1 tape_device_t:chr_file setattr;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_setattr_tape_dev'($*)) dnl
+ ')
+
+
+########################################
+##
+## Unconfined access to storage devices.
+##
+##
+##
+## Domain allowed access.
+##
+##
+#
+ define(`storage_unconfined',` dnl
+ pushdef(`policy_call_depth',incr(policy_call_depth)) dnl
+ policy_m4_comment(policy_call_depth,begin `storage_unconfined'($*)) dnl
+
+ gen_require(`
+ attribute storage_unconfined_type;
+ ')
+
+ typeattribute $1 storage_unconfined_type;
+
+ popdef(`policy_call_depth') dnl
+ policy_m4_comment(policy_call_depth,end `storage_unconfined'($*)) dnl
+ ')
+
+##
+## Basic filesystem types and interfaces.
+##
+##
+##
+## This module contains basic filesystem types and interfaces. This
+## includes:
+##
+## - The concept of different file types including basic
+## files, mount points, tmp files, etc.
+## - Access to groups of files and all files.
+## - Types and interfaces for the basic filesystem layout
+## (/, /etc, /tmp, /usr, etc.).
+##
+##